[引用][C] Fingerprints on mobile devices: Abusing and leaking

Y Zhang, Z Chen, H Xue, T Wei - Black Hat Conference, 2015

[PDF][PDF] Fingerprints on mobile devices: Abusing and leaking

T Wei, Y Zhang - 2015 - blackhat.com
… attacker can remotely harvest fingerprints in … can steal your fingerprints either from …
registered fingerprint number to …
以上显示的是最相近的搜索结果。 查看全部搜索结果