Author:
Tian Dave Jing,Bates Adam,Butler Kevin
Reference42 articles.
1. M. Al-Zarouni. The Reality of Risks from Consented Use of USB Devices. School of Computer and Information Science, Edith Cowan University, Perth, Western Australia, 2006.
2. A. Bates, R. Leonard, H. Pruse, K. R. Butler, and D. Lowd. Leveraging USB to Establish Host Identity Using Commodity Devices. In Proceedings of the 2014 Network and Distributed System Security Symposium, NDSS '14, February 2014.
3. R. Biddle, S. Chiasson, and P. Van Oorschot. Graphical Passwords: Learning from the First Twelve Years. ACM Comput. Surv., 44(4):19:1--19:41, Sept. 2012.
4. V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification with Radiometric Signatures. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom '08, Sept. 2008.
5. S. Brostoff and M. Sasse. Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In People and Computers XIV -- Usability or Else!, pages 405--424. Springer London, 2000.
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献