標(biāo)題: Titlebook: Information Security Technology for Applications; 16th Nordic Conferen Peeter Laud Conference proceedings 2012 Springer-Verlag Berlin Heide [打印本頁] 作者: 討論小組 時間: 2025-3-21 18:56
書目名稱Information Security Technology for Applications影響因子(影響力)
書目名稱Information Security Technology for Applications影響因子(影響力)學(xué)科排名
書目名稱Information Security Technology for Applications網(wǎng)絡(luò)公開度
書目名稱Information Security Technology for Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security Technology for Applications被引頻次
書目名稱Information Security Technology for Applications被引頻次學(xué)科排名
書目名稱Information Security Technology for Applications年度引用
書目名稱Information Security Technology for Applications年度引用學(xué)科排名
書目名稱Information Security Technology for Applications讀者反饋
書目名稱Information Security Technology for Applications讀者反饋學(xué)科排名
作者: Fissure 時間: 2025-3-21 21:17
User Tracking on the Web via Cross-Browser Fingerprintings, the availability of a specific font set, the time zone, and the screen resolution are enough to uniquely identify most users of the five most popular web browsers, and that user agent strings are fairly effective but fragile identifiers of a browser instance.作者: 同義聯(lián)想法 時間: 2025-3-22 00:37
Methods for Privacy Protection Considering Status of Service Provider and User Community two elements: user background information of the provider and user community status. The monitoring is done before disclosing individual attributes corresponding to the privacy policy (i.e., the required anonymity level) by each user. The validity of the proposed methods was confirmed by a desk model.作者: 使聲音降低 時間: 2025-3-22 06:58 作者: Water-Brash 時間: 2025-3-22 09:00 作者: 用手捏 時間: 2025-3-22 15:26 作者: 誘拐 時間: 2025-3-22 18:00 作者: CLOUT 時間: 2025-3-23 00:25 作者: finale 時間: 2025-3-23 05:05 作者: 手術(shù)刀 時間: 2025-3-23 06:00 作者: Myelin 時間: 2025-3-23 11:37
Internet Voting in Estoniaand the supremacy of the paper ballot serve as main strongholds against vote buying and other infringements of the principle of free elections..Possible future developments and expansion of technical platforms will be addressed.作者: 翅膀拍動 時間: 2025-3-23 15:34
Mental Voting Boothse use of an untappable channel in order to transmit a piece of information before the voting phase. Mental booths also allow for the voter to safely delegate his own voice to an untrusted person while still being able to verify that the untrusted person followed his instructions while voting.作者: vanquish 時間: 2025-3-23 21:08
Optimized Inlining of Runtime Monitorsnstrumented code. Using these optimizations, the monitor inlining can run in time . where . and . are respectively the size and number of transitions present in the synchronous product of the original program and the property. Furthermore, we show how the size of the instrumented program can be minimized.作者: 占線 時間: 2025-3-23 23:13
Rooting Android – Extending the ADB by an Auto-connecting WiFi-Accessible Servicerations. We also discuss how an application can be designed to function with minimum resources, be hidden and perform operations without user consent or interaction. We also provide an overview of how a rooted Android operating system can be misused.作者: 收集 時間: 2025-3-24 03:32 作者: exceed 時間: 2025-3-24 07:08
https://doi.org/10.1007/978-3-642-29615-4digital signature; e-government; hardware security; privacy transparency; user identification作者: vitreous-humor 時間: 2025-3-24 12:41
978-3-642-29614-7Springer-Verlag Berlin Heidelberg 2012作者: Mosaic 時間: 2025-3-24 18:51 作者: 是比賽 時間: 2025-3-24 19:23 作者: 縮影 時間: 2025-3-25 03:11
Peeter LaudFast-track conference proceedings.State-of-the-art research.Up-to-date results作者: Certainty 時間: 2025-3-25 04:32 作者: 費解 時間: 2025-3-25 11:13 作者: 團結(jié) 時間: 2025-3-25 14:02 作者: 多節(jié) 時間: 2025-3-25 17:24 作者: MUTED 時間: 2025-3-25 21:39 作者: 撫慰 時間: 2025-3-26 02:40 作者: 就職 時間: 2025-3-26 07:36
Radu Lupu,Eugen Borcoci,Tinku Rasheedesses alter the forms of production, livelihood strategies, and the use of land and labour in rural sites. In addition to the discussions on disappearing ruralities, the state policies on rural development and governance have accelerated ongoing transformation and turn our attention toward state-soc作者: 忙碌 時間: 2025-3-26 12:31 作者: Heretical 時間: 2025-3-26 15:05
Deian Stefan,Alejandro Russo,David Mazières,John C. Mitchellenched wealth for the few, verging on the dynastic in some cases, alongside some of the highest levels of poverty and inequality in Europe. There is more home ownership, but no investment in housing for the next generation and now a scandalous national housing crisis. We live in a consumer wonderlan作者: 格言 時間: 2025-3-26 19:48 作者: 極小 時間: 2025-3-26 23:11 作者: 心神不寧 時間: 2025-3-27 01:52 作者: defuse 時間: 2025-3-27 08:54 作者: 宇宙你 時間: 2025-3-27 12:29 作者: corporate 時間: 2025-3-27 13:58 作者: 蝕刻 時間: 2025-3-27 19:58
Mental Voting Boothstection as that offered by physical voting booths, essentially protecting them from over-the-shoulder coercion attacks (shoulder-surfing). We introduce a framework to model voting booths and formulate a property of the modelled booths that is sufficient to ensure over-the-shoulder coercion resistanc作者: cancellous-bone 時間: 2025-3-27 22:38
Methods for Privacy Protection Considering Status of Service Provider and User Communityespecially when a user receives user centric services from a service provider by offering personal information, because the service can be of a higher quality if the user provides more personal information despite the increase of privacy violation risk. Therefore, this paper proposes a privacy prote作者: Recess 時間: 2025-3-28 05:11
The Security and Memorability of Passwords Generated by Using an Association Element and a Personal ssarily true. Users can be encouraged to design strong passwords, using elements associated with a given service, together with a personal factor. Regulatory bodies and information security experts are often asked the question: “what is a good password?” We claim that this is not the right question;作者: 越自我 時間: 2025-3-28 08:15 作者: 牢騷 時間: 2025-3-28 10:49 作者: 易于出錯 時間: 2025-3-28 17:51
Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Servicemportant. Particularly, providing seamless mobile re-authentication service for real-time inter-domain handover procedures is still an open issue. This paper is focused on the re-authentication architecture and mechanisms design, aiming to low latency re-authentication services for roaming WLAN or W作者: irreducible 時間: 2025-3-28 22:34 作者: 吹牛需要藝術(shù) 時間: 2025-3-29 01:35 作者: Presbycusis 時間: 2025-3-29 04:35
An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networksicient in-network data aggregation while preserving the privacy of the data of individual sensor nodes has emerged as an important requirement in numerous WSN applications. For privacy-preserving data aggregation in WSNs, He et al. (INFOCOM 2007) have proposed a Cluster-based Private Data Aggregatio作者: SCORE 時間: 2025-3-29 10:59 作者: 慢跑鞋 時間: 2025-3-29 12:13 作者: Anemia 時間: 2025-3-29 16:18 作者: judicial 時間: 2025-3-29 23:29 作者: Infusion 時間: 2025-3-30 00:57
Frédérick Lemay,Rapha?l Khoury,Nadia Tawbiontological crisis triggered by the secession of a province that has been constructed as the ontic space of the Serbian nation since the late 19th century. .978-3-030-20669-7978-3-030-20667-3Series ISSN 2947-7980 Series E-ISSN 2947-7999 作者: CONE 時間: 2025-3-30 07:46 作者: urethritis 時間: 2025-3-30 12:14
Jordi Cucurull,Simin Nadjm-Tehrani,Massimiliano Raciti作者: Hyperalgesia 時間: 2025-3-30 13:50 作者: 變白 時間: 2025-3-30 16:32 作者: 瑪瑙 時間: 2025-3-30 21:16
Increasing Service Users’ Privacy Awareness by Introducing On-Line Interactive Privacy Featuresase users’ privacy awareness and encourage users to find out more about the uses of their personal data. However, users’ ICT skills and Internet experience significantly influence whether a feature is favoured or otherwise. In general, it is concluded that privacy features are very much welcomed and作者: alliance 時間: 2025-3-31 01:06
Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Servicedistribution mechanism is proposed and the related local re-authentication protocol. Eventually, the validation of the security properties of the re-authentication protocol, as well as the functional correctness validation of the re-authentication service is performed.作者: follicle 時間: 2025-3-31 06:23 作者: 航海太平洋 時間: 2025-3-31 12:24 作者: 陪審團 時間: 2025-3-31 15:51 作者: BOAST 時間: 2025-3-31 21:03 作者: 吞下 時間: 2025-3-31 22:13
Kirsi Helkala,Nils Kalstad Svendsen crisis as fundamentally a crisis of knowing and telling, voicing ontological insecurity as masters and slaves become indistinguishable over suspicions of piracy. The same conjuncture is used in a different context in popular anti-Southern discourses during the Civil War, as decorated letter envelop