Integrating a Usable Security Protocol into User Authentication Services Design Process Plus de livres similaires

Human Aspects of Information Security, Privacy, and Trust Human Aspects of Information Security, Privacy, and Trust
2016
HCI for Cybersecurity, Privacy and Trust HCI for Cybersecurity, Privacy and Trust
2019
Human Aspects of Information Security, Privacy, and Trust Human Aspects of Information Security, Privacy, and Trust
2015
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2018
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2017
Information Systems Security and Privacy Information Systems Security and Privacy
2019
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2020
Information Systems Security and Privacy Information Systems Security and Privacy
2020
Emerging Technologies for Authorization and Authentication Emerging Technologies for Authorization and Authentication
2022
Computer Security Computer Security
2020
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2015
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2019
Emerging Information Security and Applications Emerging Information Security and Applications
2022
Technology and Practice of Passwords Technology and Practice of Passwords
2016
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2019