Filament 发表于 2025-3-21 18:58:40

书目名称Human Aspects of Information Security, Privacy, and Trust影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0428972<br><br>        <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0428972<br><br>        <br><br>

Amenable 发表于 2025-3-21 23:42:34

Theo TryfonasIncludes supplementary material:

腐蚀 发表于 2025-3-22 03:15:18

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/h/image/428972.jpg

Humble 发表于 2025-3-22 08:34:57

http://reply.papertrans.cn/43/4290/428972/428972_4.png

孵卵器 发表于 2025-3-22 11:24:58

http://reply.papertrans.cn/43/4290/428972/428972_5.png

Ophthalmologist 发表于 2025-3-22 14:45:01

http://reply.papertrans.cn/43/4290/428972/428972_6.png

anticipate 发表于 2025-3-22 18:56:41

User Identification Using Gamesfect system. In this paper we present the notion of using videogames, specifically Tetris, to supplement traditional authentication methods and provide an additional layer of identity validation. Two experiments were undertaken that required participants to play a modified version of Tetris; the fir

multiply 发表于 2025-3-23 00:32:24

http://reply.papertrans.cn/43/4290/428972/428972_8.png

micronutrients 发表于 2025-3-23 03:44:50

Implicit Authentication for Mobile Devices Using Typing Behaviorportion of the user’s sensitive data and communications. We propose a secondary implicit authentication scheme which monitors typing behavior to detect unauthorized use and lock down the mobile device. We build a basic implementation of our scheme on the Android operating system. Our user studies on

LUDE 发表于 2025-3-23 06:11:44

http://reply.papertrans.cn/43/4290/428972/428972_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Human Aspects of Information Security, Privacy, and Trust; 4th International Co Theo Tryfonas Conference proceedings 2016 Springer Internat