Laptop theft: a case study on the effectiveness of security mechanisms in open organizations
暂无分享,去创建一个
[1] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[2] P Drummond,et al. Can your computer keep a secret? , 1983, Health and social service journal.
[3] Tadayoshi Kohno,et al. Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs , 2008, USENIX Security Symposium.
[4] Mikko T. Siponen,et al. Overcoming the insider: reducing employee computer crime through Situational Crime Prevention , 2009, CACM.
[5] Serban I. Gavrila,et al. Proximity-Based Authentication for Mobile Devices , 2005, Security and Management.
[6] S. Berg. Snowball Sampling—I , 2006 .
[7] Roy H. Campbell,et al. BootJacker: compromising computers using forced restarts , 2008, CCS.
[8] Neil Barrett,et al. Penetration testing and social engineering: Hacking the weakest link , 2003, Inf. Secur. Tech. Rep..
[9] Sven Türpe,et al. Attacking the BitLocker Boot Process , 2009, TRUST.
[10] Pieter H. Hartel,et al. Two methodologies for physical penetration testing using social engineering , 2009, ACSAC '10.
[11] D. Cornish. OPPORTUNITIES, PRECIPITATORS AND CRIMINAL DECISIONS: A REPLY TO WORTLEY'S CRITIQUE OF SITUATIONAL CRIME PREVENTION , 2003 .