E-Book, Englisch, 141 Seiten, eBook
Reihe: Security and Cryptology
Blythe Financial Cryptography and Data Security
Erscheinungsjahr 2012
ISBN: 978-3-642-34638-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
E-Book, Englisch, 141 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-642-34638-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Linguistic Properties of Multi-word Passphrases.- Understanding the Weaknesses of Human-Protocol Interaction.- High Stakes: Designing a Privacy Preserving Registry.- Protected Login.- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks.- A Conundrum of Permissions: Installing Applications on an Android Smartphone.- Methodology for a Field Study of Anti-malware Software.- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application.- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed.- Ethical and Secure Data Sharing across Borders.- Author Index.