ERUPT 发表于 2025-3-25 07:14:28

https://doi.org/10.1007/978-3-319-93524-9access control; authentication; automotive security; computer networks; cryptography; data mining; data pr

Lipoma 发表于 2025-3-25 08:08:19

http://reply.papertrans.cn/47/4654/465340/465340_22.png

领巾 发表于 2025-3-25 15:08:15

http://reply.papertrans.cn/47/4654/465340/465340_23.png

pericardium 发表于 2025-3-25 19:39:51

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465340.jpg

范例 发表于 2025-3-26 00:01:48

http://reply.papertrans.cn/47/4654/465340/465340_25.png

Lice692 发表于 2025-3-26 01:31:39

Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applicationsing, but allows for the fact that we do not have a specification of the system under test. We demonstrate this methodology on a case study and find that this is a viable method for automation of systematic security evaluations.

tooth-decay 发表于 2025-3-26 07:57:38

A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Couponstity, with selective disclosure of customer’s certified attributes. On the other hand, our proposal meets other necessary security requirements, such as forging protection and double-redeem protection.

使显得不重要 发表于 2025-3-26 12:05:59

Philanthropy on the Blockchainty. An SMS based mobile payment system is proposed for provisioning the received donations using the existing GSM network, very basic mobile phones and One Time Password (OTP) security tokens. The proposed scheme is finally evaluated for security while discussing the impact it has on charities and donors.

brachial-plexus 发表于 2025-3-26 16:16:28

http://reply.papertrans.cn/47/4654/465340/465340_29.png

等级的上升 发表于 2025-3-26 18:31:44

http://reply.papertrans.cn/47/4654/465340/465340_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Information Security Theory and Practice; 11th IFIP WG 11.2 In Gerhard P. Hancke,Ernesto Damiani Conference proceedings 2018 IFIP Internati