找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: ICT Systems Security and Privacy Protection; 33rd IFIP TC 11 Inte Lech Jan Janczewski,Mirosław Kutyłowski Conference proceedings 2018 IFIP

[复制链接]
楼主: Glitch
发表于 2025-3-26 22:56:43 | 显示全部楼层
Assessing Privacy Policies of Internet of Things Servicesjective of the framework is to serve as supportive tool for users to take privacy-related informed decisions. For example when buying a new fitness tracker, users could compare different models in respect to privacy friendliness or more particular aspects of the framework such as if data is given to
发表于 2025-3-27 04:41:11 | 显示全部楼层
JonDonym Users’ Information Privacy Concernsntegrates these factors is relating the Internet Users Information Privacy Concerns (IUIPC) construct to trust and risk beliefs. However, studies haven’t yet applied it to a privacy enhancing technology (PET) such as an anonymization service. Therefore, we conducted a survey among 416 users of the a
发表于 2025-3-27 08:28:19 | 显示全部楼层
Optimal Security Configuration for Cyber Insurancehighest management level. Cyber risks are usually either mitigated by technical means (countermeasures) or transferred to another party (i.e., insurer). Both options require significant investments and organisations face the problem of optimal distribution of cyber security budget between these risk
发表于 2025-3-27 12:56:56 | 显示全部楼层
发表于 2025-3-27 16:32:54 | 显示全部楼层
发表于 2025-3-27 19:37:48 | 显示全部楼层
发表于 2025-3-27 22:30:49 | 显示全部楼层
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical Viychological development according to the socioculture theory. Password guessing shows that English oriented passwords are weaker than those oriented in native languages. The study shows that choices of password generation policy design should be informed by contextual factors if they are to be effec
发表于 2025-3-28 06:02:07 | 显示全部楼层
EMPower: Detecting Malicious Power Line Networks from EM Emissions radio receiver—identifying the presence of a network near-perfectly within the same room, even when idle, and with 74.6% accuracy two rooms away and on a different floor. Thus realising the capability to monitor an environment for unwanted power line networks.
发表于 2025-3-28 08:56:53 | 显示全部楼层
A Security Analysis of FirstCoinattacks. We propose a double-spending attack that exploits these vulnerabilities and demonstrate the proposed attack’s feasibility by running it in an isolated evaluation environment. This way, we show FirstCoin to be insecure and provide a real-world example that underpins the general problem of cr
发表于 2025-3-28 10:27:47 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-9 21:29
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表