激怒 发表于 2025-3-23 11:58:56

http://reply.papertrans.cn/71/7019/701823/701823_11.png

Jocose 发表于 2025-3-23 16:10:38

http://reply.papertrans.cn/71/7019/701823/701823_12.png

预测 发表于 2025-3-23 20:30:26

Detecting Computer Worms in the Cloudle to detect unknown and new appearing computer worms. Using our approach, a spreading computer worm can be detected on the spreading behavior itself without accessing or directly influencing running virtual machines of the cloud.

铁塔等 发表于 2025-3-23 23:43:49

Flexible and Dynamic Consent-Capturingnsent decision. In this paper, we present a solution that addresses how to capture, store, evaluate and withdraw consent. The proposed solution preserves integrity of consent, essential to provide a digital evidence for legal proceedings. Furthermore, it accommodates emergency situations when users cannot provide their consent.

osculate 发表于 2025-3-24 02:46:33

http://reply.papertrans.cn/71/7019/701823/701823_15.png

Osmosis 发表于 2025-3-24 09:03:45

Evoking Comprehensive Mental Models of Anonymous Credentialspproach. Results show that the adapted card-based approach is a good approach towards evoking the right mental models for anonymous credential applications. However, better design paradigms are still needed to make users understand that attributes can be used to satisfy conditions without revealing the value of the attributes themselves.

Crumple 发表于 2025-3-24 13:10:54

http://reply.papertrans.cn/71/7019/701823/701823_17.png

玉米 发表于 2025-3-24 15:33:46

http://reply.papertrans.cn/71/7019/701823/701823_18.png

Carcinoma 发表于 2025-3-24 21:19:17

http://reply.papertrans.cn/71/7019/701823/701823_19.png

吹牛需要艺术 发表于 2025-3-25 01:59:28

Towards Usable Interfaces for Proof Based Access Rights on Mobile Devicess on the fly. We show this exemplary with a developed prototype application for supporting collaborative scenarios on a mobile device. We also present first evaluation results of an early prototype and address current as well as future work.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Open Problems in Network Security; IFIP WG 11.4 Interna Jan Camenisch,Dogan Kesdogan Conference proceedings 2012 IFIP International Federat