极小 发表于 2025-3-26 23:11:20

http://reply.papertrans.cn/47/4654/465336/465336_31.png

心神不宁 发表于 2025-3-27 01:52:46

http://reply.papertrans.cn/47/4654/465336/465336_32.png

defuse 发表于 2025-3-27 08:54:04

http://reply.papertrans.cn/47/4654/465336/465336_33.png

宇宙你 发表于 2025-3-27 12:29:23

http://reply.papertrans.cn/47/4654/465336/465336_34.png

corporate 发表于 2025-3-27 13:58:07

http://reply.papertrans.cn/47/4654/465336/465336_35.png

蚀刻 发表于 2025-3-27 19:58:21

Mental Voting Boothstection as that offered by physical voting booths, essentially protecting them from over-the-shoulder coercion attacks (shoulder-surfing). We introduce a framework to model voting booths and formulate a property of the modelled booths that is sufficient to ensure over-the-shoulder coercion resistanc

cancellous-bone 发表于 2025-3-27 22:38:31

Methods for Privacy Protection Considering Status of Service Provider and User Communityespecially when a user receives user centric services from a service provider by offering personal information, because the service can be of a higher quality if the user provides more personal information despite the increase of privacy violation risk. Therefore, this paper proposes a privacy prote

Recess 发表于 2025-3-28 05:11:41

The Security and Memorability of Passwords Generated by Using an Association Element and a Personal ssarily true. Users can be encouraged to design strong passwords, using elements associated with a given service, together with a personal factor. Regulatory bodies and information security experts are often asked the question: “what is a good password?” We claim that this is not the right question;

越自我 发表于 2025-3-28 08:15:51

http://reply.papertrans.cn/47/4654/465336/465336_39.png

牢骚 发表于 2025-3-28 10:49:48

http://reply.papertrans.cn/47/4654/465336/465336_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security Technology for Applications; 16th Nordic Conferen Peeter Laud Conference proceedings 2012 Springer-Verlag Berlin Heide