沙发 发表于 2025-3-23 12:59:15
http://reply.papertrans.cn/43/4202/420130/420130_11.pngcommitted 发表于 2025-3-23 16:54:19
http://reply.papertrans.cn/43/4202/420130/420130_12.pnginhumane 发表于 2025-3-23 19:36:35
https://doi.org/10.1007/978-3-030-52455-5heir writing style through Adversarial Authorship. There have been several iterations of AuthorCAAT that were all tested for efficiency, but not for usability. In this work, we conduct a preliminary study on AuthorCAAT-V to determine any features that need improvement to inform our iterative designTEN 发表于 2025-3-23 22:57:47
https://doi.org/10.1007/978-1-4612-2400-6cal password schemes such as the Android Pattern Unlock (APU) are often the primary means for authentication, or they constitute an auxiliary (or backup) method to be used in case biometrics fail. Passcodes need to be memorable to be usable, hence users tend to choose easy to guess passwords, compro强壮 发表于 2025-3-24 05:25:47
Light Shakes Hands with Life and Art,tion. Even though there are numerous studies that examined users’ experiences with a variety of authentication methods, very few have focused on the approach of granting users the freedom to select one or more authentication methods of their own choice. Initial work in this area suggested that the ‘使尴尬 发表于 2025-3-24 07:08:28
http://reply.papertrans.cn/43/4202/420130/420130_16.pngGraves’-disease 发表于 2025-3-24 14:36:06
http://reply.papertrans.cn/43/4202/420130/420130_17.pngordain 发表于 2025-3-24 17:05:48
Improving Consumer Data Privacy Protection and Trust in the Context of the Digital Platformes is needed in the global markets. Trust plays an important role in bridging the digital divide. Trust has long been key to social development and economic growth, and this is even more true in the digital economy of the Internet era. Most existing research on the relationship between consumers andVAN 发表于 2025-3-24 19:23:00
Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABEing. To share sensitive personal health data securely, many frameworks and approaches using blockchain-based systems have been proposed. However, the issue of letting individuals control and manage their data with privacy-preserving is still to be solved. In this paper, we propose a new model of Ind咆哮 发表于 2025-3-25 03:03:28
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s) five to eight) and their parents perceive and deal with the Internet and the privacy and security risks of being online. Therefore, we extended prior studies of Internet mental models of children. We used a two-fold study design by including drawing tasks in addition to a verbal interview. The draw