Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Bauer, Ljudevit"'
Autor:
Bauer, Ljudevit
Publikováno v:
Relations. (3-4):145-157
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=57274
Outsourcing computation to remote parties ("workers") is an increasingly common practice, owing in part to the growth of cloud computing. However, outsourcing raises concerns that outsourced tasks may be completed incorrectly, whether by accident or
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aa2b9d17fa4da81869393164d4ac95ed
This document is the technical appendix for the following paper: L. Bauer, S. Cai, L. Jia, T. Passaro, M. Stroucken, and Y. Tian. Run-time monitoring and formal analysis of information flows in Chromium. In Proceedings of the 22nd Annual Network & Di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7755fee640a1573859dce44ed1fe44eb
Autor:
Bauer, Ljudevit
Publikováno v:
Umjetnost riječi / Art of Words. (3):395-399
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=247108
Publikováno v:
Umjetnost riječi / Art of Words. (3-4):201-208
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=8805
Autor:
Mazurek, Michelle L., Saranga Komanduri, Vidas, Tim, Bauer, Ljudevit, Christin, Nicolas, Cranor, Lorrie, Kelley, Patrick, Shay, Richard, Blase Ur
Despite considerable research on passwords, empirical studies of password strength have been limited by lack of access to plaintext passwords, small data sets, and password sets specifically collected for a research study or from low-value accounts.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3f0974fa6d27497287f650069974c45e
Autor:
Bauer, Ljudevit
Publikováno v:
Sodobnost (1963)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3825::007a47a6948e38e612d848315cada0d1
http://www.dlib.si/details/URN:NBN:SI:doc-FMPWNNQI
http://www.dlib.si/details/URN:NBN:SI:doc-FMPWNNQI
This document contains a set of guidelines aimed at helping software designers and developers in designing moreeffective warning dialogs. These guidelines were compiled from available literature on usable security and warningsresearch and from Human
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0fdf8b733bd479d382d4153804eb3d37
Autor:
Aljuraidan, Jassim, Fragkaki, Elli, Bauer, Ljudevit, Limin Jia, Miyake, Yutaka, Fukushima, Kazuhide, Kiyomoto, Shinsaku
Recent years have seen a dramatic increase in the number and importance in daily life of smartphones and similar mobile devices. The security properties that these devices provide to their applications, however, are inadequate to protect against many
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0fb5dc74508a3f51357047d78054a586
Run-time monitors ensure that untrusted software and system behavior adheres to a security policy. This paper defines an expressive formal framework, based on I/O automata, for modeling systems, policies, and run-time monitors in more detail than is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ee9524bf4aadf1f2bfb156bdb2ef99f1