custody 发表于 2025-3-30 08:42:47

http://reply.papertrans.cn/27/2630/262998/262998_51.png

COLIC 发表于 2025-3-30 14:47:02

Privacy-Preserving Loyalty Programsional reward if he wants to learn more details on the consumer’s profile. Our protocol is based on partially blind signatures and generalization techniques, and provides anonymity to consumers and their purchases, while still allowing negotiated consumer profiling.

FECT 发表于 2025-3-30 19:15:50

Analysis of Social Engineering Threats with Attack Graphss paper, we propose to consider social engineering exploits together with technical vulnerabilities. We introduce a method for the integration of social engineering exploits into attack graphs and propose a simple quantitative analysis of the graphs that helps to develop a comprehensive defensive strategy.

情爱 发表于 2025-3-30 22:59:07

Introducing Probabilities in Controller Strategiesbilistic setting both active and passive controllers can be expressed by the same model. In a probabilistic setting, however, these two types of controllers can differ. We respectively use the notions of generative and reactive processes to capture this distinction and discuss the different behaviours obtaining in the different settings.

朦胧 发表于 2025-3-31 01:59:43

http://reply.papertrans.cn/27/2630/262998/262998_55.png

亵渎 发表于 2025-3-31 07:18:29

Conference proceedings 2015te talk from the QASA workshop - selected out of 52 submissions. The papers are organized in topical sections on data privacy management; autonomous and spontaneous security; and quantitative aspects in security assurance.
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance; 9th International Wo Joaquin Garcia-Alfaro,Jordi Herrera-