Zobrazeno 1 - 10
of 566
pro vyhledávání: '"empirical security"'
To protect users from data breaches and phishing attacks, service providers typically implement two-factor authentication (2FA) to add an extra layer of security against suspicious login attempts. However, since 2FA can sometimes hinder user experien
Externí odkaz:
http://arxiv.org/abs/2411.11551
Smartphone technology has drastically improved over the past decade. These improvements have seen the creation of specialized health applications, which offer consumers a range of health-related activities such as tracking and checking symptoms of he
Externí odkaz:
http://arxiv.org/abs/2107.13754
Autor:
PARKINSON, SIMON1 s.parkinson@hud.ac.uk, KHAN, SAAD1 s.khan@hud.ac.uk
Publikováno v:
ACM Computing Surveys. Jul2023, Vol. 55 Issue 6, p1-28. 28p.
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Simon Parkinson, Saad Khan
Publikováno v:
ACM Computing Surveys. 55:1-28
There any many different access-control systems, yet a commonality is that they provide flexible mechanisms to enforce different access levels. Their importance in organisations to adequately restrict resources, coupled with their use in a dynamic en
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings of the 18th International Conference on Security and Cryptography.
Smartphone technology has drastically improved over the past decade. These improvements have seen the creation of specialized health applications, which offer consumers a range of health-related activities such as tracking and checking symptoms of he
Over the past years, an enormous variety of different chaos-based image and video encryption algorithms have been proposed and published. While any algorithm published undergoes some more or less strict experimental security analysis, many of those s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1a066194fa5bed3fe004659bdb0d5182
Autor:
Wang Xiao, Luping
Publikováno v:
UCrea Repositorio Abierto de la Universidad de Cantabria
Universidad de Cantabria (UC)
Universidad de Cantabria (UC)
One of the main issues to be addressed in cryptography is key establishment, due to its importance for private key cryptography. Public key has overcome this problem in general, but there are still many cases where it cannot be applied, e.g. when mem
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b537907ea97025be420946ae0298262e
http://hdl.handle.net/10902/7852
http://hdl.handle.net/10902/7852