搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Aaron T. Emigh , James A. Roskind
DOI:
关键词:
摘要: In some embodiments, techniques for secure data entry comprise presenting a field in spoof-resistant manner, receiving data, and securing data.
,2012, 引用: 3
,2014, 引用: 5
,2011, 引用: 21
,2014, 引用: 3