找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: ICT Systems Security and Privacy Protection; 33rd IFIP TC 11 Inte Lech Jan Janczewski,Miros?aw Kuty?owski Conference proceedings 2018 IFIP

[復制鏈接]
樓主: Glitch
31#
發(fā)表于 2025-3-26 22:56:43 | 只看該作者
Assessing Privacy Policies of Internet of Things Servicesjective of the framework is to serve as supportive tool for users to take privacy-related informed decisions. For example when buying a new fitness tracker, users could compare different models in respect to privacy friendliness or more particular aspects of the framework such as if data is given to
32#
發(fā)表于 2025-3-27 04:41:11 | 只看該作者
JonDonym Users’ Information Privacy Concernsntegrates these factors is relating the Internet Users Information Privacy Concerns (IUIPC) construct to trust and risk beliefs. However, studies haven’t yet applied it to a privacy enhancing technology (PET) such as an anonymization service. Therefore, we conducted a survey among 416 users of the a
33#
發(fā)表于 2025-3-27 08:28:19 | 只看該作者
Optimal Security Configuration for Cyber Insurancehighest management level. Cyber risks are usually either mitigated by technical means (countermeasures) or transferred to another party (i.e., insurer). Both options require significant investments and organisations face the problem of optimal distribution of cyber security budget between these risk
34#
發(fā)表于 2025-3-27 12:56:56 | 只看該作者
35#
發(fā)表于 2025-3-27 16:32:54 | 只看該作者
36#
發(fā)表于 2025-3-27 19:37:48 | 只看該作者
37#
發(fā)表于 2025-3-27 22:30:49 | 只看該作者
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical Viychological development according to the socioculture theory. Password guessing shows that English oriented passwords are weaker than those oriented in native languages. The study shows that choices of password generation policy design should be informed by contextual factors if they are to be effec
38#
發(fā)表于 2025-3-28 06:02:07 | 只看該作者
EMPower: Detecting Malicious Power Line Networks from EM Emissions radio receiver—identifying the presence of a network near-perfectly within the same room, even when idle, and with 74.6% accuracy two rooms away and on a different floor. Thus realising the capability to monitor an environment for unwanted power line networks.
39#
發(fā)表于 2025-3-28 08:56:53 | 只看該作者
A Security Analysis of FirstCoinattacks. We propose a double-spending attack that exploits these vulnerabilities and demonstrate the proposed attack’s feasibility by running it in an isolated evaluation environment. This way, we show FirstCoin?to be insecure and provide a real-world example that underpins the general problem of cr
40#
發(fā)表于 2025-3-28 10:27:47 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-2 01:18
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
大埔县| 富顺县| 汤原县| 玉田县| 双柏县| 昌都县| 英超| 海晏县| 镇宁| 庆城县| 贵定县| 宿州市| 伊吾县| 钟山县| 灌云县| 康平县| 两当县| 都昌县| 灵丘县| 剑河县| 蒙阴县| 英吉沙县| 阿坝| 蕉岭县| 耿马| 济源市| 无为县| 灵山县| 阳高县| 扶沟县| 贺兰县| 海宁市| 陆良县| 洪泽县| 长垣县| 永善县| 襄垣县| 石城县| 永顺县| 游戏| 庐江县|