amphibian 发表于 2025-3-28 17:02:10

http://reply.papertrans.cn/47/4604/460384/460384_41.png

Dungeon 发表于 2025-3-28 18:56:09

IT Security Investment and Costing Emphasizing Benefits in Times of Limited Budgetsibution of IT security procedures to support business process productivity. Several examples show opportunities how to generate economic revenues through appropriate security investments. These examples may serve as blueprints helping IT security mangers to claim appropriate budgets. Open issues are

infatuation 发表于 2025-3-28 23:40:22

http://reply.papertrans.cn/47/4604/460384/460384_43.png

天然热喷泉 发表于 2025-3-29 05:49:28

e-Identity – Monetization and Interoperabilitye added value of making use of government provided identities..The value of identity means different things to different people at different times. In a world where Internet-based dematerialisation continues to increase, concepts such as identity, authentication and integrity are among the key safeg

debacle 发表于 2025-3-29 09:28:05

http://reply.papertrans.cn/47/4604/460384/460384_45.png

affect 发表于 2025-3-29 15:11:52

http://reply.papertrans.cn/47/4604/460384/460384_46.png

Restenosis 发表于 2025-3-29 18:42:49

http://reply.papertrans.cn/47/4604/460384/460384_47.png

geriatrician 发表于 2025-3-29 19:50:25

http://reply.papertrans.cn/47/4604/460384/460384_48.png

prediabetes 发表于 2025-3-30 00:18:30

Privacy-Preserving Smart Meteringling, but also for profiling, settlement, forecasting, tariff and energy efficiency advice. We propose a privacy-preserving protocol for general calculations on fine-grained meter readings, while keeping the use of tamper evident meters to a strict minimum. We allow users to perform and prove the co

Commonwealth 发表于 2025-3-30 07:16:18

http://reply.papertrans.cn/47/4604/460384/460384_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: ISSE 2012Securing Electronic Business Processes; Highlights of the In Helmut Reimer,Norbert Pohlmann,Wolfgang Schneider Book 2012 Springer