找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪(fǎng)問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: ICT Systems Security and Privacy Protection; 33rd IFIP TC 11 Inte Lech Jan Janczewski,Miros?aw Kuty?owski Conference proceedings 2018 IFIP

[復(fù)制鏈接]
樓主: Glitch
31#
發(fā)表于 2025-3-26 22:56:43 | 只看該作者
Assessing Privacy Policies of Internet of Things Servicesjective of the framework is to serve as supportive tool for users to take privacy-related informed decisions. For example when buying a new fitness tracker, users could compare different models in respect to privacy friendliness or more particular aspects of the framework such as if data is given to
32#
發(fā)表于 2025-3-27 04:41:11 | 只看該作者
JonDonym Users’ Information Privacy Concernsntegrates these factors is relating the Internet Users Information Privacy Concerns (IUIPC) construct to trust and risk beliefs. However, studies haven’t yet applied it to a privacy enhancing technology (PET) such as an anonymization service. Therefore, we conducted a survey among 416 users of the a
33#
發(fā)表于 2025-3-27 08:28:19 | 只看該作者
Optimal Security Configuration for Cyber Insurancehighest management level. Cyber risks are usually either mitigated by technical means (countermeasures) or transferred to another party (i.e., insurer). Both options require significant investments and organisations face the problem of optimal distribution of cyber security budget between these risk
34#
發(fā)表于 2025-3-27 12:56:56 | 只看該作者
35#
發(fā)表于 2025-3-27 16:32:54 | 只看該作者
36#
發(fā)表于 2025-3-27 19:37:48 | 只看該作者
37#
發(fā)表于 2025-3-27 22:30:49 | 只看該作者
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical Viychological development according to the socioculture theory. Password guessing shows that English oriented passwords are weaker than those oriented in native languages. The study shows that choices of password generation policy design should be informed by contextual factors if they are to be effec
38#
發(fā)表于 2025-3-28 06:02:07 | 只看該作者
EMPower: Detecting Malicious Power Line Networks from EM Emissions radio receiver—identifying the presence of a network near-perfectly within the same room, even when idle, and with 74.6% accuracy two rooms away and on a different floor. Thus realising the capability to monitor an environment for unwanted power line networks.
39#
發(fā)表于 2025-3-28 08:56:53 | 只看該作者
A Security Analysis of FirstCoinattacks. We propose a double-spending attack that exploits these vulnerabilities and demonstrate the proposed attack’s feasibility by running it in an isolated evaluation environment. This way, we show FirstCoin?to be insecure and provide a real-world example that underpins the general problem of cr
40#
發(fā)表于 2025-3-28 10:27:47 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-31 20:09
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
河池市| 太原市| 怀远县| 桑日县| 固阳县| 泸州市| 丽江市| 防城港市| 会理县| 沂水县| 隆回县| 育儿| 瓦房店市| 凤山市| 桂东县| 方正县| 苏尼特右旗| 遂溪县| 沁水县| 繁昌县| 儋州市| 保德县| 金平| 安仁县| 宝清县| 额尔古纳市| 剑川县| 通河县| 精河县| 武威市| 义马市| 桐庐县| 定边县| 定南县| 历史| 苍梧县| 壶关县| 曲靖市| 启东市| 泰来县| 朝阳县|