Tracheotomy 发表于 2025-3-28 15:14:25

http://reply.papertrans.cn/43/4290/428974/428974_41.png

间接 发表于 2025-3-28 19:07:09

http://reply.papertrans.cn/43/4290/428974/428974_42.png

杠杆 发表于 2025-3-29 00:08:48

Predicting Graphical Passwordsorrelated with an individual using memorable information (such as the individuals spouses, pets, preferred sports teams, children, and so on). This paper also introduces a novel metric for graphical-password strength to provide feedback to an individual without the requirement of knowing the image or having password statistics a priori.

绝食 发表于 2025-3-29 04:54:44

http://reply.papertrans.cn/43/4290/428974/428974_44.png

伴随而来 发表于 2025-3-29 09:34:46

Principles of Persuasion in Social Engineering and Their Use in Phishingishing is based on peer review and further research is needed to make it automatic, but the approach we follow, together with principles we propose, can be applied more consistently and more comprehensively than the original taxonomies.

POLYP 发表于 2025-3-29 14:13:21

http://reply.papertrans.cn/43/4290/428974/428974_46.png

等级的上升 发表于 2025-3-29 19:33:05

http://reply.papertrans.cn/43/4290/428974/428974_47.png

Countermand 发表于 2025-3-29 22:57:47

The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-B is based on insight from previously gathered data from usability studies conducted at the United States National Institute of Standards and Technology. It also leverages web technologies to flexibly display data sets computed from sets of passwords. The tool is available at ..

Clinch 发表于 2025-3-30 00:06:30

http://reply.papertrans.cn/43/4290/428974/428974_49.png

peak-flow 发表于 2025-3-30 04:58:17

The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivatiitive behavioral effects of such programs to occur. However, ISA programs may cause a false sense of security, as vulnerability perceptions are reduced by consuming ISA programs but not affecting intentions for compliant security behavior. Perceived monitoring strengthens this confirmed intention-behavior link.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Human Aspects of Information Security, Privacy, and Trust; Third International Theo Tryfonas,Ioannis Askoxylakis Conference proceedings 20