The fairy tale of What You See Is What You Sign' -Trojan Horse Attacks on Software for Digital Signatures, IFIP Working Conf. on Security and Control of IT in Society-II, 2001. ,
Recognizing objects in adversarial clutter: breaking a visual CAPTCHA, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings., pp.134-141, 2003. ,
DOI : 10.1109/CVPR.2003.1211347
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9732
Secure Input for Web Applications, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.375-384, 2007. ,
DOI : 10.1109/ACSAC.2007.28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.365.3030
Using Smart Cards to Integrate SSL/TLS and SESAME, IFIP TC6/TC11 International Conference on Communications and Multimedia Security, pp.303-317, 1999. ,
Collaboration of SSL smart cards within the WEB2 landscape, 2009 International Symposium on Collaborative Technologies and Systems, pp.187-194, 2009. ,
DOI : 10.1109/CTS.2009.5067480