马用 发表于 2025-3-21 16:29:23

书目名称Information Security Technology for Applications影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465335<br><br>        <br><br>书目名称Information Security Technology for Applications读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465335<br><br>        <br><br>

新星 发表于 2025-3-21 20:41:55

Authentication Session Migrationtch to another device while using a service, they have to re-authenticate. If several services and authenticated sessions are open, switching between the devices becomes cumbersome. Single Sign-on (SSO) techniques help to log in to several services but re-authentication is still necessary after chan

justify 发表于 2025-3-22 03:45:02

http://reply.papertrans.cn/47/4654/465335/465335_3.png

圣歌 发表于 2025-3-22 04:43:37

Experimental Analysis of the Femtocell Location Verification Techniquesnities. While emerging as a new low-cost technology which assures best connectivity, it has also introduced a range of new potential risks for the mobile network operators. Here we study the risks associated with the location verification techniques of femtocells. First we state the goals of locatio

Watemelon 发表于 2025-3-22 09:36:03

http://reply.papertrans.cn/47/4654/465335/465335_5.png

muffler 发表于 2025-3-22 15:08:17

http://reply.papertrans.cn/47/4654/465335/465335_6.png

Invertebrate 发表于 2025-3-22 20:37:21

Practical Private Information Aggregation in Large Networks partial mesh networks. The aggregation process often involves security or business-critical information which network providers are generally unwilling to share without strong privacy protection. We present efficient and scalable protocols for privately computing a large range of aggregation functi

走调 发表于 2025-3-22 23:38:53

http://reply.papertrans.cn/47/4654/465335/465335_8.png

Graphite 发表于 2025-3-23 03:06:30

Service Users’ Requirements for Tools to Support Effective On-line Privacy and Consent Practicesdentify privacy practices used when engaging with on-line services and elicit service user requirements for privacy dialogues. The findings are considered against the established design principles for general CRM dialogue design such as: frequency, initiation, signalling, service provider disclosure

谦卑 发表于 2025-3-23 06:26:28

Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessionsegularly changing IP addresses, though. We show how patterns mined from web traffic can be used to re-identify a majority of users, i. e. link multiple sessions of them. We implement the web user re-identification attack using a Multinomial Naïve Bayes classifier and evaluate it using a real-world d
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security Technology for Applications; 15th Nordic Conferen Tuomas Aura,Kimmo Järvinen,Kaisa Nyberg Conference proceedings 2012