Author:
Ogawa Michael-Brian,Auernheimer Brent,Endicott-Popovsky Barbara,Hinrichs Ran,Crosby Martha E.
Publisher
Springer Nature Switzerland
Reference17 articles.
1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)
2. Lecture Notes in Computer Science;P Andriotis,2014
3. Lecture Notes in Computer Science;Y-Y Choong,2014
4. Colnago, J., et al.: “It’s not actually that horrible”: exploring adoption of two-factor authentication at a university. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–11 (2018). https://doi.org/10.1145/3173574.3174030
5. Feng, L., Cho, K.L., Song, C., Xu, C., Jin, X.: Brain password: a secure and truly cancelable brain biometrics for smart headwear. In: The 16th Annual International Conference, MobiSys 2018 (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献