找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Socio-Technical Aspects in Security and Trust; 9th International Wo Thomas Groß,Theo Tryfonas Conference proceedings 2021 Springer Nature S

[复制链接]
楼主: 非决定性
发表于 2025-3-25 03:57:37 | 显示全部楼层
发表于 2025-3-25 10:49:57 | 显示全部楼层
A Security Analysis of the Danish Deposit Return Systemit typically sees a set of human parties (e.g. customers, cashiers) and technical parties (e.g., RVMs, databases, scanners) to collaborate in order to enable effective recycling. In this paper, we advance a formal treatment of the Danish Deposit Return System (DRS). We investigate the security of th
发表于 2025-3-25 13:30:44 | 显示全部楼层
Moving to Client-Side Hashing for Online Authenticationlemented in practice. The common practice today, inherited from previous but obsolete constraints, is to transmit the password in cleartext to the server, where it is hashed and stored. We investigate the advantages and drawbacks of the alternative of hashing client-side, and show that it is present
发表于 2025-3-25 17:03:47 | 显示全部楼层
发表于 2025-3-26 00:02:39 | 显示全部楼层
发表于 2025-3-26 02:04:55 | 显示全部楼层
Investigating the Effect of Incidental Affect States on Privacy Behavioral Intentionfect (fear and happy) on privacy behavioral intention. We recruited 330 participants for a within-subjects experiment in three random-controlled user studies. The participants were exposed to three conditions ., ., . with standardised stimuli videos for incidental affect induction. Fear and happy st
发表于 2025-3-26 05:46:57 | 显示全部楼层
发表于 2025-3-26 08:34:10 | 显示全部楼层
What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study empirical studies are generally based on convenience sampled public data sets. Also, there is a need for more in-depth, qualitative studies in order to understand what drives bug hunters and product owners towards finding constructive ways of working together.
发表于 2025-3-26 14:38:05 | 显示全部楼层
Association Attacks in IEEE 802.11: Exploiting WiFi Usability Featuresar, we analyze various strategies that may be implemented by an adversary in order to increase the success rate of association attacks, and we show that even though network managers have hampered the effectiveness of some known attacks (e.g. KARMA), other techniques (e.g. Known Beacons) are still an active threat.
发表于 2025-3-26 20:38:21 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-26 01:31
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表