下船 发表于 2025-3-25 03:57:37

http://reply.papertrans.cn/88/8703/870240/870240_21.png

有效 发表于 2025-3-25 10:49:57

A Security Analysis of the Danish Deposit Return Systemit typically sees a set of human parties (e.g. customers, cashiers) and technical parties (e.g., RVMs, databases, scanners) to collaborate in order to enable effective recycling. In this paper, we advance a formal treatment of the Danish Deposit Return System (DRS). We investigate the security of th

micronutrients 发表于 2025-3-25 13:30:44

Moving to Client-Side Hashing for Online Authenticationlemented in practice. The common practice today, inherited from previous but obsolete constraints, is to transmit the password in cleartext to the server, where it is hashed and stored. We investigate the advantages and drawbacks of the alternative of hashing client-side, and show that it is present

Hdl348 发表于 2025-3-25 17:03:47

http://reply.papertrans.cn/88/8703/870240/870240_24.png

acolyte 发表于 2025-3-26 00:02:39

http://reply.papertrans.cn/88/8703/870240/870240_25.png

ureter 发表于 2025-3-26 02:04:55

Investigating the Effect of Incidental Affect States on Privacy Behavioral Intentionfect (fear and happy) on privacy behavioral intention. We recruited 330 participants for a within-subjects experiment in three random-controlled user studies. The participants were exposed to three conditions ., ., . with standardised stimuli videos for incidental affect induction. Fear and happy st

丰富 发表于 2025-3-26 05:46:57

http://reply.papertrans.cn/88/8703/870240/870240_27.png

transplantation 发表于 2025-3-26 08:34:10

What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study empirical studies are generally based on convenience sampled public data sets. Also, there is a need for more in-depth, qualitative studies in order to understand what drives bug hunters and product owners towards finding constructive ways of working together.

一窝小鸟 发表于 2025-3-26 14:38:05

Association Attacks in IEEE 802.11: Exploiting WiFi Usability Featuresar, we analyze various strategies that may be implemented by an adversary in order to increase the success rate of association attacks, and we show that even though network managers have hampered the effectiveness of some known attacks (e.g. KARMA), other techniques (e.g. Known Beacons) are still an active threat.

Ceremony 发表于 2025-3-26 20:38:21

http://reply.papertrans.cn/88/8703/870240/870240_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Socio-Technical Aspects in Security and Trust; 9th International Wo Thomas Groß,Theo Tryfonas Conference proceedings 2021 Springer Nature S