有特色 发表于 2025-3-25 05:11:51

http://reply.papertrans.cn/47/4602/460177/460177_21.png

LANCE 发表于 2025-3-25 07:44:17

http://reply.papertrans.cn/47/4602/460177/460177_22.png

fiction 发表于 2025-3-25 14:29:16

A Hypergame Analysis for ErsatzPasswordsymmetry, are present. We demonstrate how hypergames can model an actual security mechanism: ErsatzPassword, a defense mechanism to protect password hashes from offline brute-force attacks. Two ErsatzPassword defensive strategies are considered: to block the attacker and trigger an alarm, or to redir

intricacy 发表于 2025-3-25 17:15:26

Walking Through the Deep: Gait Analysis for User Authentication Through Deep Learning. With seamless authentication, biometric features such as human gait, become a way to control authorized access on mobile devices, without actually requiring user interaction. However, this analysis is a challenging task, prone to errors, with the need to dynamic adapt to new conditions and require

他姓手中拿着 发表于 2025-3-25 21:33:54

http://reply.papertrans.cn/47/4602/460177/460177_25.png

ambivalence 发表于 2025-3-26 03:01:38

When Your Browser Becomes the Paper Boye, an attacker needs to trigger JavaScript code on the browser, e.g. through an advertisement. However, unlike other Web attacks, e.g. cross-site scripting, the attack can be executed isolated from the Origin of the site visited by the user..We demonstrate this by forcing common browsers to join an

烦扰 发表于 2025-3-26 07:54:35

http://reply.papertrans.cn/47/4602/460177/460177_27.png

Feature 发表于 2025-3-26 12:02:36

Attacking RO-PUFs with Enhanced Challenge-Response Pairset al. We present an attack that can predict all PUF responses after querying the PUF with . attacker-chosen queries. This result renders the proposed RO-PUF with Enhanced Challenge-Response Pairs inapt for most typical PUF use cases, including but not limited to all cases where an attacker has quer

Pastry 发表于 2025-3-26 16:30:50

A Security Analysis of FirstCointals list more than 1.500 cryptocurrencies. Many of them slightly deviate from approved and tested technical concepts and realize security-related functionality in different ways. While the security of major cryptocurrencies has already been studied in more detail, security properties of less popula

大火 发表于 2025-3-26 18:52:11

http://reply.papertrans.cn/47/4602/460177/460177_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: ICT Systems Security and Privacy Protection; 33rd IFIP TC 11 Inte Lech Jan Janczewski,Mirosław Kutyłowski Conference proceedings 2018 IFIP