讨好女人 发表于 2025-3-28 17:15:29

http://reply.papertrans.cn/47/4656/465541/465541_41.png

不连贯 发表于 2025-3-28 21:59:28

http://reply.papertrans.cn/47/4656/465541/465541_42.png

Ccu106 发表于 2025-3-29 02:57:32

http://reply.papertrans.cn/47/4656/465541/465541_43.png

施魔法 发表于 2025-3-29 03:45:26

http://reply.papertrans.cn/47/4656/465541/465541_44.png

Armory 发表于 2025-3-29 08:48:37

Verification of Money Atomicity in Digital Cash Based Payment System construction of the models of the digital cash based payment system using Event-B, wherein we verify how money atomicity property can be preserved in these systems. This ensures that money is neither generated nor destroyed in the electronic payment transactions.

上下倒置 发表于 2025-3-29 12:56:45

http://reply.papertrans.cn/47/4656/465541/465541_46.png

草率男 发表于 2025-3-29 15:40:36

Fighting Malicious Softwareopment from both academia and industry, the problem is still poorly contained. In this paper, we make the case for a malware defense approach that uses expressive behavior specifications that are general enough to characterize and detect a wide variety of malicious programs. Moreover, our approach c

Vulnerable 发表于 2025-3-29 20:41:30

VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Securityt not always be equivalent to those in desktop browsers. In this paper, we perform the first large-scale security comparison between mobile and desktop browsers. We focus our efforts on display security given the inherent screen limitations of mobile phones. We evaluate display elements in ten mobil

Harass 发表于 2025-3-30 03:31:01

http://reply.papertrans.cn/47/4656/465541/465541_49.png

令人不快 发表于 2025-3-30 07:13:22

Foundations of Dynamic Access Controlentiality protection. Unlike the strict Bell-LaPadula mandatory access controls, these labels are allowed to change in controlled ways by users and applications. The implications of these dynamic changes need to be examined carefully, and existing formalisms cannot express or help us understand thei
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Systems Security; 8th International Co Venkat Venkatakrishnan,Diganta Goswami Conference proceedings 2012 Springer-Verlag Berli