A. Spalka, A. B. Cremers, and H. Langweg, The fairy tale of What You See Is What You Sign' -Trojan Horse Attacks on Software for Digital Signatures, IFIP Working Conf. on Security and Control of IT in Society-II, 2001.

G. Mori and J. Malik, Recognizing objects in adversarial clutter: breaking a visual CAPTCHA, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings., pp.134-141, 2003.
DOI : 10.1109/CVPR.2003.1211347

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9732

M. Szydlowski, C. Kruegel, and E. Kirda, Secure Input for Web Applications, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.375-384, 2007.
DOI : 10.1109/ACSAC.2007.28

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.365.3030

M. Vandenwauver, P. Ashley, J. Claessens, M. Looi, and W. Moreau, Using Smart Cards to Integrate SSL/TLS and SESAME, IFIP TC6/TC11 International Conference on Communications and Multimedia Security, pp.303-317, 1999.

P. Urien, Collaboration of SSL smart cards within the WEB2 landscape, 2009 International Symposium on Collaborative Technologies and Systems, pp.187-194, 2009.
DOI : 10.1109/CTS.2009.5067480