What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors
暂无分享,去创建一个
[1] Nobuhiko Kitawaki,et al. A model for evaluating talker echo and sidetone in a telephone transmission network , 1992, IEEE Trans. Commun..
[2] James A. Gosling,et al. The java language environment: a white paper , 1995 .
[3] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[4] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[5] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[6] Stuart E. Schechter,et al. The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies † , 2007 .
[7] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[8] Lujo Bauer,et al. Expandable grids for visualizing and authoring computer security policies , 2008, CHI.