-
1“... the hidden-cameras gathering. This article discussed about the phenomena of news-gathering through hidden...”
Get full text
Others -
2“... forth to prevent illicit videotaping using hidden cameras. One of the most effective ways to cease...”
Get full text
Others -
3“... or developed hidden camera. The issue that government and people should concern is the personal privacy...”
Get full text
Others -
4“... information while users in the login process by using the shoulder-surfing attack and/or the hidden-camera...”
Get full text
Others -
5“... in the detection of hidden camera operation. In general, the structure of a video sequence can be divided into four...”
Get full text
Others -
6“... schemes are vulnerable to login-recording attacks, including the shoulder-surfing attack, the hidden...”
Get full text
Others -
7“..., the hidden-camera attack, the spyware attack, and the wiretapping attack. Thus, many PIN-entry methods...”
Get full text
Others -
8“... authentication schemes are vulnerable to capture attacks, which may be the shoulder-surfing attack, the hidden...”
Get full text
Others