Suture 发表于 2025-3-21 18:48:02
书目名称Human Aspects of Information Security, Privacy, and Trust影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0428973<br><br> <br><br>书目名称Human Aspects of Information Security, Privacy, and Trust读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0428973<br><br> <br><br>dragon 发表于 2025-3-21 22:32:15
E-voting Authentication with QR-codesder, most probably a smartphone. This approach is based on visual cryptography as the work horse: The e-voting passwords for authentication are encoded as QR-codes and later encrypted into shadow transparencies. Thus, the transparency by itself conveys no information but when the layers are combined, the secret password is revealed.Cupidity 发表于 2025-3-22 01:15:34
0302-9743 AS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful减去 发表于 2025-3-22 08:24:40
http://reply.papertrans.cn/43/4290/428973/428973_4.pngFrenetic 发表于 2025-3-22 12:19:02
http://reply.papertrans.cn/43/4290/428973/428973_5.png你不公正 发表于 2025-3-22 15:15:15
Discrete Hardware Apparatus and Method for Mobile Application and Communication Securityrations while the standard cell phone or tablet remains unchanged, providing only its connectivity capabilities. The increasing cost caused by e.g. fraud in the area of mobile banking provides the background to economically justify this effort, which can in parallel support many other areas of mobile security.滑稽 发表于 2025-3-22 19:14:52
http://reply.papertrans.cn/43/4290/428973/428973_7.pngfleeting 发表于 2025-3-22 23:41:05
Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passivsite designs. We find that one of the options – red background of the password field – captures significantly more attention than the others, but is less linked to the underlying problem than the yellow warning triangle option. Thus, we recommend a combination of the two options.Dna262 发表于 2025-3-23 03:01:02
On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Securityts and implications of this paper can be considered valuable in elaborating a common architecture for future deployment of adaptive usable security systems on a variety of application areas and services through the World Wide Web.多产鱼 发表于 2025-3-23 08:48:58
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Methodal prompt influences the user to change their pattern to a more effective and complex one. We also investigate potential correlations between our findings and results of a previous pilot study in order to detect any significant biases on setting a Pattern-Lock.