派博傳思國際中心

標(biāo)題: Titlebook: Human Aspects of Information Security, Privacy, and Trust; Second International Theo Tryfonas,Ioannis Askoxylakis Conference proceedings 20 [打印本頁]

作者: Suture    時(shí)間: 2025-3-21 18:48
書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)




書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust網(wǎng)絡(luò)公開度




書目名稱Human Aspects of Information Security, Privacy, and Trust網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次




書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用




書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋




書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋學(xué)科排名





作者: dragon    時(shí)間: 2025-3-21 22:32
E-voting Authentication with QR-codesder, most probably a smartphone. This approach is based on visual cryptography as the work horse: The e-voting passwords for authentication are encoded as QR-codes and later encrypted into shadow transparencies. Thus, the transparency by itself conveys no information but when the layers are combined, the secret password is revealed.
作者: Cupidity    時(shí)間: 2025-3-22 01:15
0302-9743 AS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful
作者: 減去    時(shí)間: 2025-3-22 08:24

作者: Frenetic    時(shí)間: 2025-3-22 12:19

作者: 你不公正    時(shí)間: 2025-3-22 15:15
Discrete Hardware Apparatus and Method for Mobile Application and Communication Securityrations while the standard cell phone or tablet remains unchanged, providing only its connectivity capabilities. The increasing cost caused by e.g. fraud in the area of mobile banking provides the background to economically justify this effort, which can in parallel support many other areas of mobile security.
作者: 滑稽    時(shí)間: 2025-3-22 19:14

作者: fleeting    時(shí)間: 2025-3-22 23:41
Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passivsite designs. We find that one of the options – red background of the password field – captures significantly more attention than the others, but is less linked to the underlying problem than the yellow warning triangle option. Thus, we recommend a combination of the two options.
作者: Dna262    時(shí)間: 2025-3-23 03:01
On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Securityts and implications of this paper can be considered valuable in elaborating a common architecture for future deployment of adaptive usable security systems on a variety of application areas and services through the World Wide Web.
作者: 多產(chǎn)魚    時(shí)間: 2025-3-23 08:48
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Methodal prompt influences the user to change their pattern to a more effective and complex one. We also investigate potential correlations between our findings and results of a previous pilot study in order to detect any significant biases on setting a Pattern-Lock.
作者: Inkling    時(shí)間: 2025-3-23 11:53
A Cognitive-Behavioral Framework of User Password Management Lifecyclet lifecycle. The paper discusses cognitive and behavioral activities throughout the lifecycle as well as the associated economics. We show the importance of a holistic approach in understanding users’ password behaviors and the framework provides guidance on future research directions.
作者: 新奇    時(shí)間: 2025-3-23 16:18

作者: theta-waves    時(shí)間: 2025-3-23 19:18

作者: 腐敗    時(shí)間: 2025-3-24 01:53
On Designing Usable Policy Languages for Declarative Trust Aggregation of .., present a simple use case of it, and evaluate to what extent .. meets our formulated requirements. In this evaluation, particular attention is given to the usability aspects of declarative languages that mean to aggregate trust evidence.
作者: 背書    時(shí)間: 2025-3-24 03:30
What Usable Security Really Means: Trusting and Engaging Userssically motivated to behave securely, and that contextual elements of their relationship with the organization provide further motivation to stay secure. Drawing on research on trust, usable security, and economics of information security, we outline how the organization-employee trust relationship can be leveraged by security designers.
作者: 共同生活    時(shí)間: 2025-3-24 09:08

作者: PALMY    時(shí)間: 2025-3-24 14:26

作者: 撕裂皮肉    時(shí)間: 2025-3-24 16:32
Conference proceedings 2014eld as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing
作者: 文件夾    時(shí)間: 2025-3-24 22:05

作者: Aromatic    時(shí)間: 2025-3-25 02:33
rm and generous. In a note on De Quincey’s death, he lashes out at the ‘envious and goutty spirit’ of ‘moralising’ critics who have meanly denounced De Quincey’s unimportant failings. He likes the aristocracy of De Quincey’s tone. Remark, he says at one point, ‘que l’homme qui parle ainsi est un hom
作者: INTER    時(shí)間: 2025-3-25 04:12

作者: 悲痛    時(shí)間: 2025-3-25 10:47
Panos Chatziadam,Ioannis G. Askoxylakis,Alexandros Fragkiadakisto extensively study the poetry of the Scapigliatura.Highlig.This book establishes the role of French writer Charles Baudelaire in the formation of paradigms of modernity in Italian poetry between 1857, the year of publication of Baudelaire’s highly influential collection?.Les Fleurs du Mal., and 19
作者: 漂亮    時(shí)間: 2025-3-25 12:52

作者: Occipital-Lobe    時(shí)間: 2025-3-25 18:39

作者: Lacerate    時(shí)間: 2025-3-25 22:34
Michael Huth,Jim Huan-Pu Kuoto extensively study the poetry of the Scapigliatura.Highlig.This book establishes the role of French writer Charles Baudelaire in the formation of paradigms of modernity in Italian poetry between 1857, the year of publication of Baudelaire’s highly influential collection?.Les Fleurs du Mal., and 19
作者: TERRA    時(shí)間: 2025-3-26 01:25

作者: visual-cortex    時(shí)間: 2025-3-26 04:42
Iacovos Kirlappos,M. Angela Sassestoffe aufeinander und kommen für Jahre und Jahrzehnte in Kontakt. Die klassischen mineralischen Baustoffe werden zunehmend durch Metalle, Glas, Leichtbauwerkstoffe und Kunststoffe erg?nzt. Gerade die Letzteren – zu denen auch die Dichtstoffe z?hlen – bringen neue Herausforderungen für alle am Bau B
作者: synovial-joint    時(shí)間: 2025-3-26 09:10
Katharina Krombholz,Peter Frühwirt,Peter Kieseberg,Ioannis Kapsalis,Markus Huber,Edgar Weipplstoffe aufeinander und kommen für Jahre und Jahrzehnte in Kontakt. Die klassischen mineralischen Baustoffe werden zunehmend durch Metalle, Glas, Leichtbauwerkstoffe und Kunststoffe erg?nzt. Gerade die Letzteren – zu denen auch die Dichtstoffe z?hlen – bringen neue Herausforderungen für alle am Bau B
作者: Ligament    時(shí)間: 2025-3-26 16:13
Rutuja More,Abhishek Borastoffe aufeinander und kommen für Jahre und Jahrzehnte in Kontakt. Die klassischen mineralischen Baustoffe werden zunehmend durch Metalle, Glas, Leichtbauwerkstoffe und Kunststoffe erg?nzt. Gerade die Letzteren — zu denen auch die Dichtstoffe z?hlen — bringen neue Herausforderungen für alle am Bau B
作者: Incumbent    時(shí)間: 2025-3-26 20:16
Paschalis Papagrigoriou,Anargyros Plemenos,Ioannis G. Askoxylakisstoffe aufeinander und kommen für Jahre und Jahrzehnte in Kontakt. Die klassischen mineralischen Baustoffe werden zunehmend durch Metalle, Glas, Leichtbauwerkstoffe und Kunststoffe erg?nzt. Gerade die Letzteren — zu denen auch die Dichtstoffe z?hlen — bringen neue Herausforderungen für alle am Bau B
作者: 耕種    時(shí)間: 2025-3-26 23:34

作者: 改良    時(shí)間: 2025-3-27 02:52
Panagiotis Andriotis,Theo Tryfonas,George Oikonomouele für Dichtstoffanwendungen finden sich im Hochbau in der Fassade, am Fenster, im Sanit?r‐ und Nassbereich, an D?chern, im Tief‐ und Brückenbau sowie bei Sonderanwendungen wie Schwimmb?dern oder Tankstellen. Auch in der hier nicht weiter behandelten Transport‐ und Investitionsgüterindustrie verwen
作者: 教育學(xué)    時(shí)間: 2025-3-27 05:20

作者: Hallowed    時(shí)間: 2025-3-27 13:21

作者: integral    時(shí)間: 2025-3-27 14:40

作者: SPECT    時(shí)間: 2025-3-27 21:12

作者: 蚊子    時(shí)間: 2025-3-27 23:09

作者: 彩色    時(shí)間: 2025-3-28 04:19

作者: 山間窄路    時(shí)間: 2025-3-28 07:55
On Designing Usable Policy Languages for Declarative Trust Aggregation therefore inform the decision making of IT systems at run-time. We first present requirements for such languages. Then we discuss an instance of such a language, .., which extends an early prototype . that was researched by others in collaboration with us. Next, we formulate the intuitive semantics
作者: 的染料    時(shí)間: 2025-3-28 12:37
An Image-Based CAPTCHA Using Sophisticated Mental Rotationeen proposed. Mental rotation is an advanced human-cognitive-processing ability to rotate mental representations of “one” single 2D/3D object. However, as have already been reported, the mental rotation CAPTCHA can be overcome by pattern matching and/or machine learning. Therefore, this paper propos
作者: 胰臟    時(shí)間: 2025-3-28 16:55
What Usable Security Really Means: Trusting and Engaging Usersms that restrict user actions to make them ‘secure’, or providing user interfaces to make security tools ‘easy to use’. We argue that an important but often-neglected aspect of compliance is trusting employees to ‘do what’s right’ for security. Previous studies suggest that most employees are intrin
作者: TOM    時(shí)間: 2025-3-28 19:35

作者: 復(fù)習(xí)    時(shí)間: 2025-3-28 23:40

作者: enchant    時(shí)間: 2025-3-29 03:50
Discrete Hardware Apparatus and Method for Mobile Application and Communication Security and communication security have significantly lowered. Most attempts on reversing this situation by means of converting standard mobile devices into tamper-proof equipment have proven to leave ample space for vulnerability of mobile processes and communication content. The only high efficacy method
作者: Ischemic-Stroke    時(shí)間: 2025-3-29 07:16

作者: barium-study    時(shí)間: 2025-3-29 14:22

作者: custody    時(shí)間: 2025-3-29 19:00

作者: 我悲傷    時(shí)間: 2025-3-29 20:22

作者: 利用    時(shí)間: 2025-3-30 01:02

作者: Contend    時(shí)間: 2025-3-30 05:55

作者: dainty    時(shí)間: 2025-3-30 10:42

作者: exhibit    時(shí)間: 2025-3-30 14:14

作者: Microgram    時(shí)間: 2025-3-30 20:08
Human Aspects of Information Security, Privacy, and Trust978-3-319-07620-1Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 無底    時(shí)間: 2025-3-30 21:28
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/h/image/428973.jpg
作者: Hiatal-Hernia    時(shí)間: 2025-3-31 04:36

作者: diskitis    時(shí)間: 2025-3-31 05:32
Human Aspects of Information Security, Privacy, and TrustSecond International
作者: Hemiplegia    時(shí)間: 2025-3-31 12:49
Yee-Yin Choonghat the culture industry has now entered the micro level of our everyday life through shopping centers, the image of profusion and more. Further, it explores new aspects of the culture industry, such as a passi978-3-319-88855-2978-3-319-69874-8
作者: impaction    時(shí)間: 2025-3-31 16:52
Soumyadeb Chowdhury,Ron Poet,Lewis Mackenziehat the culture industry has now entered the micro level of our everyday life through shopping centers, the image of profusion and more. Further, it explores new aspects of the culture industry, such as a passi978-3-319-88855-2978-3-319-69874-8
作者: Ebct207    時(shí)間: 2025-3-31 19:06

作者: 祖?zhèn)?nbsp;   時(shí)間: 2025-3-31 23:21
Kristen K. Greene,Melissa A. Gallagher,Brian C. Stanton,Paul Y. Lee




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
广南县| 淄博市| 乌兰察布市| 襄城县| 孟州市| 齐齐哈尔市| 潢川县| 长岛县| 库尔勒市| 宁乡县| 图片| 三门峡市| 汉川市| 花莲市| 永嘉县| 方正县| 镇江市| 崇礼县| 淄博市| 虎林市| 定远县| 开化县| 宁安市| 若羌县| 石阡县| 庆阳市| 石林| 黄石市| 虎林市| 焦作市| 连云港市| 鄂托克旗| 扶风县| 梧州市| 南汇区| 张掖市| 肇源县| 崇阳县| 黄大仙区| 克拉玛依市| 汪清县|