Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[KNIHA][B] SSL and TLS: Theory and Practice
R Oppliger - 2023 - books.google.com
Now in its Third Edition, this completely revised and updated reference provides a thorough
and comprehensive introduction into the SSL, TLS, and DTLS protocols, explaining all the …
and comprehensive introduction into the SSL, TLS, and DTLS protocols, explaining all the …
Towards GDPR-compliant data processing in modern SIEM systems
The introduction of the General Data Protection Regulation (GDPR) in Europe raises a
whole series of issues and implications on the handling of corporate data. We consider the …
whole series of issues and implications on the handling of corporate data. We consider the …
SSL/TLS session-aware user authentication–Or how to effectively thwart the man-in-the-middle
Man-in-the-middle attacks pose a serious threat to SSL/TLS-based electronic commerce
applications, such as Internet banking. In this paper, we argue that most deployed user …
applications, such as Internet banking. In this paper, we argue that most deployed user …
[PDF][PDF] Digital signatur. En eksemplarisk analyse af en teknologis indre mekanismer og processer
N Jørgensen - Lokaliseret d, 2018 - webhotel4.ruc.dk
Denne artikel er et case-studium af digital signatur. Formalet er at redegøre for begrebet “en
teknologis indre mekanismer og processer”. Meget kort sagt henviser begrebet til hvordan …
teknologis indre mekanismer og processer”. Meget kort sagt henviser begrebet til hvordan …
Distributed ONS and its Impact on Privacy
B Fabian, O Gunther - 2007 IEEE International Conference on …, 2007 - ieeexplore.ieee.org
The EPC Network is an industry proposal to build a global information architecture for
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …
Usage control enforcement-a survey
ÅA Nyre - … Conference on Availability, Reliability, and Security, 2011 - Springer
Sharing information allows businesses to take advantage of hidden knowledge, improve
work processes and cooperation both within and across organisations. Thus there is a need …
work processes and cooperation both within and across organisations. Thus there is a need …
Social life of PKI: sociotechnical development of Korean public-key infrastructure
D Park - IEEE Annals of the History of Computing, 2015 - ieeexplore.ieee.org
Until the late 1990s, technology analysts expected public-key infrastructure (PKI) technology
to be an essential element of online security systems. Today however, South Korea …
to be an essential element of online security systems. Today however, South Korea …
Certification authorities under attack: A plea for certificate legitimation
R Oppliger - IEEE internet computing, 2013 - ieeexplore.ieee.org
Several recent attacks against certification authorities (CAs) and fraudulently issued
certificates have put the security and usefulness of the Internet public-key infrastructure (PKI) …
certificates have put the security and usefulness of the Internet public-key infrastructure (PKI) …
Mercury: Recovering forgotten passwords using personal devices
Instead of allowing the recovery of original passwords, forgotten passwords are often reset
using online mechanisms such as password verification questions (PVQ methods) and …
using online mechanisms such as password verification questions (PVQ methods) and …
[KNIHA][B] Mobile Qualifizierte Elektronische Signaturen: Analyse der Hemmnisfaktoren und Gestaltungsvorschläge zur Einführung
H Roßnagel - 2009 - books.google.com
Heiko Roßnagel diskutiert die Ursachen für den fehlenden Markterfolg elektronischer
Signaturen. Er stellt mobile qualifizierte elektronische Signaturen als Alternative vor und …
Signaturen. Er stellt mobile qualifizierte elektronische Signaturen als Alternative vor und …