你敢命令 发表于 2025-3-25 04:35:20

Information Security and Privacy Research978-3-642-30436-1Series ISSN 1868-4238 Series E-ISSN 1868-422X

Interim 发表于 2025-3-25 09:28:36

https://doi.org/10.1007/978-3-642-30436-1Web authentication; botnet; cryptanalysis; phishing; smart cards; algorithm analysis and problem complexi

falsehood 发表于 2025-3-25 12:28:01

http://reply.papertrans.cn/47/4655/465432/465432_23.png

手段 发表于 2025-3-25 16:49:04

http://reply.papertrans.cn/47/4655/465432/465432_24.png

欲望 发表于 2025-3-25 20:25:44

Dimitris Gritzalis,Steven Furnell,Marianthi TheohaState-of-the-art research.Fast-track conference proceedings.Unique visibility

群居男女 发表于 2025-3-26 00:53:43

IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/i/image/465432.jpg

诙谐 发表于 2025-3-26 08:11:34

http://reply.papertrans.cn/47/4655/465432/465432_27.png

follicular-unit 发表于 2025-3-26 09:33:26

Michael Roland,Josef Langer,Josef Scharingerthe participation of all stakeholders. Usually, designers focus on arranging methods and tools to support participants’ ideation and expression trying to overcome the barriers resulting from differences in background, skills, attitudes, and expertise (Sanders and Stappers .). However, acting as faci

Mercurial 发表于 2025-3-26 12:54:50

Alessandro Armando,Alessio Merlo,Mauro Migliardi,Luca Verderameherefore, the potential of eye movement-based interaction in VR is far from being realized. In addition, many scholars tried to define some special eye movements as input instructions, but these definitions are almost always empirical and neglect users’ habits and cultural background. In this paper,

欢笑 发表于 2025-3-26 19:20:08

Bernhard J. Berger,Karsten Sohr. The Chinese community is one of the most important foreign groups in Milan, with notable involvement of the community members in the restaurant business. The aim of the research is investigating design potentials for cross-cultural environments and scenarios. We focus on Chino-Italian services in
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security and Privacy Research; 27th IFIP TC 11 Info Dimitris Gritzalis,Steven Furnell,Marianthi Theoha Conference proceedings 2