Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Stajano, F.: Will Your Digital Butlers Betray You? In: Syverson, P., De Capitani di Vimercati, S. (eds.) Proceedings of the 2004 Workshop on Privacy in the Electronic Society, pp. 37–38. ACM, Washington (2004)
2. Lecture Notes in Computer Science;F. Stajano,2000
3. Sammes, T., Jenkinson, B.: Forensic Computing: A Practitioner’s Guide. Springer, Heidelberg (2000)
4. Lecture Notes in Computer Science;S. Brands,1994
5. Scheeres, J.: Implantable Chip, On Sale Now (October 25, 2002), http://www.wired.com/news/privacy/0,1848,55999,00.html
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Only play in your comfort zone: interaction methods for improving security awareness on mobile devices;Personal and Ubiquitous Computing;2015-03-27
2. It’s the Anthropology, Stupid!;Security Protocols XVIII;2014
3. User Profiling with Virtual Pet for Mobile Device Authentication;Informatics Engineering and Information Science;2011
4. Can i borrow your phone?;Proceedings of the SIGCHI Conference on Human Factors in Computing Systems;2009-04-04