欲望 发表于 2025-3-28 16:30:57

harp, 1982). Our purpose was to suggest a redirection in the community applications of behavior modification. We reviewed the considerable accomplishments of community applications of behavior theory in a variety of different settings, especially in the home and school. Next, we observed the limits

TAP 发表于 2025-3-28 21:23:14

http://reply.papertrans.cn/87/8636/863547/863547_42.png

Flirtatious 发表于 2025-3-29 00:25:17

Security and Trust Management978-3-319-11851-2Series ISSN 0302-9743 Series E-ISSN 1611-3349

新星 发表于 2025-3-29 04:39:24

http://reply.papertrans.cn/87/8636/863547/863547_44.png

amenity 发表于 2025-3-29 09:05:53

http://reply.papertrans.cn/87/8636/863547/863547_45.png

GONG 发表于 2025-3-29 15:24:05

http://reply.papertrans.cn/87/8636/863547/863547_46.png

Agronomy 发表于 2025-3-29 18:46:46

http://reply.papertrans.cn/87/8636/863547/863547_47.png

王得到 发表于 2025-3-29 22:31:16

https://doi.org/10.1007/978-3-319-11851-2access control; applied computing; authentication; network security; privacy; risk management; security; se

愤愤不平 发表于 2025-3-30 02:08:22

Conference proceedings 2014 in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, secur

Cocker 发表于 2025-3-30 06:53:20

0302-9743 w, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust polic
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Security and Trust Management; 10th International W Sjouke Mauw,Christian Damsgaard Jensen Conference proceedings 2014 Springer Internation