Considerations for Identity Management in Public Safety Networks
暂无分享,去创建一个
[1] Rethinking Passwords to Adapt to Constrained Keyboards , 2011 .
[2] Markus Jakobsson,et al. Implicit authentication for mobile devices , 2009 .
[3] Joint Task Force Transformation Initiative,et al. Security and Privacy Controls for Federal Information Systems and Organizations , 2013 .
[4] R. Holland,et al. Don't Stand So Close to Me , 2004, Psychological science.
[5] Ernst Haselsteiner. Security in Near Field Communication ( NFC ) Strengths and Weaknesses , 2006 .
[6] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[7] Elizabeth B. Lennon. ITL Updates Federal Information Processing Standard (FIPS) for Personal Identity Verification (PIV) of Federal Employees and Contractors | NIST , 2013 .