-
1“... schemes are vulnerable to login-recording attacks, including the shoulder-surfing attack, the hidden...”
Get full text
Others -
2“..., the hidden-camera attack, the spyware attack, and the wiretapping attack. Thus, many PIN-entry methods...”
Get full text
Others