Zobrazeno 1 - 10
of 3 890
pro vyhledávání: '"A. van Oorschot"'
Autor:
J. Choi, R. van Beek, E. L. Chamberlain, T. Reimann, H. Smeenge, A. van Oorschot, J. Wallinga
Publikováno v:
SOIL, Vol 10, Pp 567-586 (2024)
Plaggic anthrosols demonstrate the significant and widespread influence of agriculture on the landscape of northern Europe and testify to increased land-use intensity over the last millennium. However, a lack of established chronologic methods to int
Externí odkaz:
https://doaj.org/article/9c763cabe5d94eacb7d36faa03bc52f1
The absence of security measures between DNS recursive resolvers and authoritative nameservers has been exploited by both inline and off-path attacks. While many security proposals have been made in practice and previous literature, they typically su
Externí odkaz:
http://arxiv.org/abs/2408.00968
Autor:
Amador, Guillermo J., van Oorschot, Brett Klaassen, Sen, Uddalok, Karman, Benjamin, Leenders, Rutger
Scientific progress within the last few decades has revealed the functional morphology of an insect's sticky footpads -- a soft, sponge-like pad that secretes a thin liquid film. However, the physico-chemical mechanisms underlying their adhesion rema
Externí odkaz:
http://arxiv.org/abs/2312.11173
Web users are increasingly presented with multiple login options, including password-based login and common web single sign-on (SSO) login options such as "Login with Google" and "Login with Facebook". There has been little focus in previous studies
Externí odkaz:
http://arxiv.org/abs/2308.13074
We carry out a detailed analysis of the security advice coding method (SAcoding) of Barrera et al. (2021), which is designed to analyze security advice in the sense of measuring actionability and categorizing advice items as practices, policies, prin
Externí odkaz:
http://arxiv.org/abs/2209.04502
The number of login options on web sites has increased since the introduction of web single sign-on (SSO) protocols. Web SSO services allow users to grant web sites or relying parties (RPs) access to their personal profile information from identity p
Externí odkaz:
http://arxiv.org/abs/2209.04490
Academic research has highlighted the failure of many Internet of Things (IoT) product manufacturers to follow accepted practices, while IoT security best practices have recently attracted considerable attention worldwide from industry and government
Externí odkaz:
http://arxiv.org/abs/2209.01285
A long list of documents have been offered as security advice, codes of practice, and security guidelines for building and using security products, including Internet of Things (IoT) devices. To date, little or no systematic analysis has been carried
Externí odkaz:
http://arxiv.org/abs/2206.09237
Autor:
Belizan, Maria, Augustovski, Federico, Bardach, Ariel, Pinto, Thatiana, Villarejo, Agustina, Lazo, Elena, Cordo, Maria V., van Oorschot, Desirée A.M.
Publikováno v:
In Value in Health Regional Issues November 2024 44
Publikováno v:
In Forensic Science International: Genetics November 2024 73