[1] |
FURNELL S , CLARKE N , KARATZOUNI S . Beyond the pin:enhancing user authentication for mobile devices[J]. Computer Fraud and Security, 2008,2008(8): 12-17.
|
[2] |
MAURO C , IRINA Z Z , BRUNO C . Mind how you answer me![A]. Proceedings of the 6th ACM Symposium on Information,Computer and Communications[C]. Hong Kong.China, 2011. 249-259.
|
[3] |
GUERRA-CASANOVA J , SáNCHEZ-VILA C , BAILADOR G ,et al. Authentication in mobile devices through hand gesture recognition[J]. International Journal of Information Security, 2012,11(2): 65-83.
|
[4] |
TRESADERN P A , IONITA M C , COOTES T F ,et al. Real-time facial feature tracking on a mobile device[J]. International Journal of Computer Vision, 2012,96(3): 280-289.
|
[5] |
CHOW R , JAKOBSSON M , MASUOKA R ,et al. Authentication in the clouds:a framework and its application to mobile users[A]. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop[C]. Chicago,Illinoism,USA, 2010. 1-6.
|
[6] |
BRAINARD J , JUELS A , RIVEST R ,et al. Fourth factor authentication:somebody you know[A]. ACM CCS[C]. Alexandria Virginia,USA, 2006. 168-78.
|
[7] |
EGELMAN S S , REEDER R W , et al. It’s not what you know,but who you know:asocial approach to last-resort authentication[A]. Proceedings of the 27th Annual SIGCHI Conference on Human Factors in Computing Systems[C]. Boston,Massachusetts,USA, 2009. 1983-1992.
|
[8] |
SOLEYMANI B , MAHESWARAN M . Social authentication protocol for mobile phones[A]. IEEE Computational Science and Engineering CSE'09 International Conference[C]. Vancouver,Canada, 2009. 436-441.
|
[9] |
Wikipedia[EB/OL]. , 2012.
|
[10] |
JOSANG A , ISMAIL R , BOYD C ,et al. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems, 2007,43(2): 618-644.
|
[11] |
YE Q , ZHU T , HU D ,et al. Cell phone mini challenge award:social network accuracy exploring temporal communication in mobile call graphs[A]. IEEE Symposium on Visual Analytics Science and Technology[C]. Columbus,Ohio,USA, 2008. 207-208.
|