LATE 发表于 2025-3-26 22:56:43

Assessing Privacy Policies of Internet of Things Servicesjective of the framework is to serve as supportive tool for users to take privacy-related informed decisions. For example when buying a new fitness tracker, users could compare different models in respect to privacy friendliness or more particular aspects of the framework such as if data is given to

amyloid 发表于 2025-3-27 04:41:11

JonDonym Users’ Information Privacy Concernsntegrates these factors is relating the Internet Users Information Privacy Concerns (IUIPC) construct to trust and risk beliefs. However, studies haven’t yet applied it to a privacy enhancing technology (PET) such as an anonymization service. Therefore, we conducted a survey among 416 users of the a

强行引入 发表于 2025-3-27 08:28:19

Optimal Security Configuration for Cyber Insurancehighest management level. Cyber risks are usually either mitigated by technical means (countermeasures) or transferred to another party (i.e., insurer). Both options require significant investments and organisations face the problem of optimal distribution of cyber security budget between these risk

绿州 发表于 2025-3-27 12:56:56

http://reply.papertrans.cn/47/4602/460177/460177_34.png

易碎 发表于 2025-3-27 16:32:54

http://reply.papertrans.cn/47/4602/460177/460177_35.png

MOAT 发表于 2025-3-27 19:37:48

http://reply.papertrans.cn/47/4602/460177/460177_36.png

delegate 发表于 2025-3-27 22:30:49

The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical Viychological development according to the socioculture theory. Password guessing shows that English oriented passwords are weaker than those oriented in native languages. The study shows that choices of password generation policy design should be informed by contextual factors if they are to be effec

羽饰 发表于 2025-3-28 06:02:07

EMPower: Detecting Malicious Power Line Networks from EM Emissions radio receiver—identifying the presence of a network near-perfectly within the same room, even when idle, and with 74.6% accuracy two rooms away and on a different floor. Thus realising the capability to monitor an environment for unwanted power line networks.

POWER 发表于 2025-3-28 08:56:53

A Security Analysis of FirstCoinattacks. We propose a double-spending attack that exploits these vulnerabilities and demonstrate the proposed attack’s feasibility by running it in an isolated evaluation environment. This way, we show FirstCoin to be insecure and provide a real-world example that underpins the general problem of cr

招惹 发表于 2025-3-28 10:27:47

http://reply.papertrans.cn/47/4602/460177/460177_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: ICT Systems Security and Privacy Protection; 33rd IFIP TC 11 Inte Lech Jan Janczewski,Mirosław Kutyłowski Conference proceedings 2018 IFIP