知道 发表于 2025-3-23 11:58:25

http://reply.papertrans.cn/87/8633/863296/863296_11.png

FLING 发表于 2025-3-23 15:56:25

http://reply.papertrans.cn/87/8633/863296/863296_12.png

Migratory 发表于 2025-3-23 20:31:36

Security of OS-Level Virtualization Technologiesfrom high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtual

Genetics 发表于 2025-3-24 00:18:13

http://reply.papertrans.cn/87/8633/863296/863296_14.png

Deceit 发表于 2025-3-24 06:22:00

-Cipher: Authenticated Encryption for Big Datais becoming ever more important design goal. .-Cipher is parallel, incremental, nonce based authenticated encryption cipher with associated data. It is designed with the special purpose of providing confidentiality and integrity for big data in transit or at rest. It has, as an option, a secret part

充足 发表于 2025-3-24 09:32:52

What Would It Take for You to Tell Your Secrets to a Cloud?storage services. Three controlled experiments were carried out to study the influence in users’ decisions to retain or surrender control over their personal information depending on different factors. The results of these experiments reveal, among other things, the users’ willingness to surrender c

curriculum 发表于 2025-3-24 10:55:29

http://reply.papertrans.cn/87/8633/863296/863296_17.png

发酵剂 发表于 2025-3-24 16:33:08

http://reply.papertrans.cn/87/8633/863296/863296_18.png

interrupt 发表于 2025-3-24 21:41:36

http://reply.papertrans.cn/87/8633/863296/863296_19.png

Angioplasty 发表于 2025-3-25 01:20:19

Attacker Profiling in Quantitative Security Assessment Based on Attack Treesy the infrastructure and attacker properties. The paper introduces . as the concept of separation of the infrastructure properties from the properties of malicious agents undertaking strategic decisions in the considered environment. We show that attacker profiling may be integrated into existing qu
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Secure IT Systems; 19th Nordic Conferen Karin Bernsmed,Simone Fischer-Hübner Conference proceedings 2014 Springer International Publishing