3JONCZY J, WUTHRICH M, I-IAENNI R. A probabilistic trust model for GnuPG[ C]//Proc of the 23rd Chaos Communication Congress. Berlin : Chaos Computer Club,2006:61 - 66.
7Peter Kieseberg, Sebastian Schrittwieser, Manuel Leithner, et al., Malicious Pixels Using QR Codes as Attack Vector [B]. Trustworthy Ubiquitous Computing, Atlantis Ambient and Pervasive Intelligence, Volume 6, 2012, pp pp.21-38.
8Vishrut Sharma,A Study of Malicious QR Codes [J]. International Journal of Computational Intelligence and Information Security, May 2012, Vol.3, No.5, pp10-15.
9ISO/IEC. ISO/IEC 18004-2015 Information Technology-- Automatic Identification anti Data Capture Techniques--QR Code 2005 Bar Code Symbology Specification [S]. Switzer- land: ISO, 2015.