找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: ICT Systems Security and Privacy Protection; 33rd IFIP TC 11 Inte Lech Jan Janczewski,Miros?aw Kuty?owski Conference proceedings 2018 IFIP

[復制鏈接]
樓主: Glitch
31#
發(fā)表于 2025-3-26 22:56:43 | 只看該作者
Assessing Privacy Policies of Internet of Things Servicesjective of the framework is to serve as supportive tool for users to take privacy-related informed decisions. For example when buying a new fitness tracker, users could compare different models in respect to privacy friendliness or more particular aspects of the framework such as if data is given to
32#
發(fā)表于 2025-3-27 04:41:11 | 只看該作者
JonDonym Users’ Information Privacy Concernsntegrates these factors is relating the Internet Users Information Privacy Concerns (IUIPC) construct to trust and risk beliefs. However, studies haven’t yet applied it to a privacy enhancing technology (PET) such as an anonymization service. Therefore, we conducted a survey among 416 users of the a
33#
發(fā)表于 2025-3-27 08:28:19 | 只看該作者
Optimal Security Configuration for Cyber Insurancehighest management level. Cyber risks are usually either mitigated by technical means (countermeasures) or transferred to another party (i.e., insurer). Both options require significant investments and organisations face the problem of optimal distribution of cyber security budget between these risk
34#
發(fā)表于 2025-3-27 12:56:56 | 只看該作者
35#
發(fā)表于 2025-3-27 16:32:54 | 只看該作者
36#
發(fā)表于 2025-3-27 19:37:48 | 只看該作者
37#
發(fā)表于 2025-3-27 22:30:49 | 只看該作者
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical Viychological development according to the socioculture theory. Password guessing shows that English oriented passwords are weaker than those oriented in native languages. The study shows that choices of password generation policy design should be informed by contextual factors if they are to be effec
38#
發(fā)表于 2025-3-28 06:02:07 | 只看該作者
EMPower: Detecting Malicious Power Line Networks from EM Emissions radio receiver—identifying the presence of a network near-perfectly within the same room, even when idle, and with 74.6% accuracy two rooms away and on a different floor. Thus realising the capability to monitor an environment for unwanted power line networks.
39#
發(fā)表于 2025-3-28 08:56:53 | 只看該作者
A Security Analysis of FirstCoinattacks. We propose a double-spending attack that exploits these vulnerabilities and demonstrate the proposed attack’s feasibility by running it in an isolated evaluation environment. This way, we show FirstCoin?to be insecure and provide a real-world example that underpins the general problem of cr
40#
發(fā)表于 2025-3-28 10:27:47 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-2 01:18
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
谢通门县| 唐山市| 阜阳市| 涟源市| 黄冈市| 汝南县| 广平县| 天全县| 醴陵市| 乳源| 泌阳县| 塔城市| 桐庐县| 织金县| 沭阳县| 武汉市| 江安县| 通榆县| 滁州市| 新丰县| 伊吾县| 额济纳旗| 溆浦县| 聂拉木县| 手机| 文水县| 齐齐哈尔市| 广灵县| 兴化市| 安新县| 宁河县| 邮箱| 甘谷县| 澄城县| 拜城县| 禄丰县| 聂荣县| 黄陵县| 雅江县| 彝良县| 石嘴山市|