共 20 条
[1]
Andriotis P., 2013, P 6 ACM C SECURITY P, P1, DOI [10.1145/2462096.2462098, DOI 10.1145/2462096.2462098]
[2]
Blonder G., 1996, GRAPHICAL PASSWORDS
[3]
Chiasson S, 2007, LECT NOTES COMPUT SC, V4734, P359
[4]
Churchill Berkeley, 2013, UNLOCK PATTERN GENER
[5]
Davis D, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P151
[6]
De Luca A., 2012, P SIGCHI C HUM FACT, P987, DOI DOI 10.1145/2207676.2208544
[7]
Dunphy P, 2010, P 6 S US PRIV SEC SO, P1
[8]
Jermyn I, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P1
[9]
Karlson AK, 2009, CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1647
[10]
Lin D., 2007, P 3 S USABLE PRIVACY, P161