Using icon arrangement for fallback authentication on smartphones
暂无分享,去创建一个
[1] Konstantin Beznosov,et al. Know your enemy: the risk of unauthorized access in smartphones by insiders , 2013, MobileHCI '13.
[2] Antonio Krüger,et al. A study on icon arrangement by smartphone users , 2013, CHI.
[3] Mike Just,et al. Designing and evaluating challenge-question systems , 2004, IEEE Security & Privacy Magazine.
[4] Patrick Baudisch,et al. Imaginary phone: learning imaginary interfaces by transferring spatial memory from a familiar device , 2011, UIST.
[5] Ariel Rabkin,et al. Personal knowledge questions for fallback authentication: security questions in the era of Facebook , 2008, SOUPS '08.