Showing 1 - 2 results of 2 for search '"The Hidden Cameras"', query time: 0.67s Refine Results
  1. 1
    by Yu-Chang Yeh, 葉育彰
    Published 2013
    ... schemes are vulnerable to login-recording attacks, including the shoulder-surfing attack, the hidden...
    Get full text
    Others
  2. 2
    by Chia-Ju Chang, 張家儒
    Published 2015
    ..., the hidden-camera attack, the spyware attack, and the wiretapping attack. Thus, many PIN-entry methods...
    Get full text
    Others