QR Code Security: A Survey of Attacks and Challenges for Usable Security. Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. R. In Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, pages 79–90, 2014.
Paper doi bibtex @inproceedings{DBLP:conf/hci/KrombholzFKKHW14,
author = {Katharina Krombholz and
Peter Fr{\"{u}}hwirt and
Peter Kieseberg and
Ioannis Kapsalis and
Markus Huber and
Edgar R. Weippl},
title = {{QR} Code Security: {A} Survey of Attacks and Challenges for Usable
Security},
booktitle = {Human Aspects of Information Security, Privacy, and Trust - Second
International Conference, {HAS} 2014, Held as Part of {HCI} International
2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings},
pages = {79--90},
year = {2014},
crossref = {DBLP:conf/hci/2014-24},
url = {https://doi.org/10.1007/978-3-319-07620-1\_8},
doi = {10.1007/978-3-319-07620-1\_8},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/hci/KrombholzFKKHW14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"2s2jNG623G2KMw98Q","bibbaseid":"krombholz-frhwirt-kieseberg-kapsalis-huber-weippl-qrcodesecurityasurveyofattacksandchallengesforusablesecurity-2014","downloads":0,"creationDate":"2017-03-20T08:02:14.732Z","title":"QR Code Security: A Survey of Attacks and Challenges for Usable Security","author_short":["Krombholz, K.","Frühwirt, P.","Kieseberg, P.","Kapsalis, I.","Huber, M.","Weippl, E. R."],"year":2014,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/w/Weippl:Edgar_R=.map","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Katharina"],"propositions":[],"lastnames":["Krombholz"],"suffixes":[]},{"firstnames":["Peter"],"propositions":[],"lastnames":["Frühwirt"],"suffixes":[]},{"firstnames":["Peter"],"propositions":[],"lastnames":["Kieseberg"],"suffixes":[]},{"firstnames":["Ioannis"],"propositions":[],"lastnames":["Kapsalis"],"suffixes":[]},{"firstnames":["Markus"],"propositions":[],"lastnames":["Huber"],"suffixes":[]},{"firstnames":["Edgar","R."],"propositions":[],"lastnames":["Weippl"],"suffixes":[]}],"title":"QR Code Security: A Survey of Attacks and Challenges for Usable Security","booktitle":"Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings","pages":"79–90","year":"2014","crossref":"DBLP:conf/hci/2014-24","url":"https://doi.org/10.1007/978-3-319-07620-1\\_8","doi":"10.1007/978-3-319-07620-1_8","timestamp":"Sat, 09 Apr 2022 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/hci/KrombholzFKKHW14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/hci/KrombholzFKKHW14,\n author = {Katharina Krombholz and\n Peter Fr{\\\"{u}}hwirt and\n Peter Kieseberg and\n Ioannis Kapsalis and\n Markus Huber and\n Edgar R. Weippl},\n title = {{QR} Code Security: {A} Survey of Attacks and Challenges for Usable\n Security},\n booktitle = {Human Aspects of Information Security, Privacy, and Trust - Second\n International Conference, {HAS} 2014, Held as Part of {HCI} International\n 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings},\n pages = {79--90},\n year = {2014},\n crossref = {DBLP:conf/hci/2014-24},\n url = {https://doi.org/10.1007/978-3-319-07620-1\\_8},\n doi = {10.1007/978-3-319-07620-1\\_8},\n timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/hci/KrombholzFKKHW14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Krombholz, K.","Frühwirt, P.","Kieseberg, P.","Kapsalis, I.","Huber, M.","Weippl, E. R."],"key":"DBLP:conf/hci/KrombholzFKKHW14","id":"DBLP:conf/hci/KrombholzFKKHW14","bibbaseid":"krombholz-frhwirt-kieseberg-kapsalis-huber-weippl-qrcodesecurityasurveyofattacksandchallengesforusablesecurity-2014","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-319-07620-1\\_8"},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"search_terms":["code","security","survey","attacks","challenges","usable","security","krombholz","frühwirt","kieseberg","kapsalis","huber","weippl"],"keywords":[],"authorIDs":["PbrP9YFAtA9NxijbL"],"dataSources":["A3zRESQ88WfwMCJn3","xwKFeNnfet6rmuMtX"]}