SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on ICT Systems Security and Privacy Protection (34. : 2019 : Lissabon) ICT systems security and privacy protection
1. Verfasser: Meng, Weizhi (VerfasserIn)
Weitere Verfasser: Li, Wenjuan (VerfasserIn), Jiang, Lijun (VerfasserIn), Zhou, Jianying (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2019
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Control Logic Injection Attacks on Industrial Control Systems 2019 Yoo, Hyunguk
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier 2019 Liu, Guanxiong
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies 2019 Alohaly, Manar
ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment 2019 Hatamian, Majid
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym 2019 Harborth, David
Forward Secure Identity-Based Signature Scheme with RSA 2019 Ko, Hankyung
Commit Signatures for Centralized Version Control Systems 2019 Vaidya, Sangat
Hunting Brand Domain Forgery: A Scalable Classification 2019 Thao, Tran Phuong
Removing Problems in Rule-Based Policies 2019 Cheng, Zheng
The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users . 2019 Simonet, Joëlle
A Structured Comparison of the Corporate Information Security Maturity Level 2019 Schmid, Michael
On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques. 2019 Sayeed, Sarwar
Towards Contractual Agreements for Revocation of Online Data 2019 Schnitzler, Theodor
Fine-Grained Access Control in Industrial Internet of Things: Evaluating Outsourced Attribute-Based Encryption 2019 Ziegler, Dominik
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild 2019 Wiefling, Stephan
Differentially Private Generative Adversarial Networks for Time Series Continuous, and Discrete Open Data 2019 Frigerio, Lorenzo
To Be, or Not to Be Notified: Eliciting Privacy Notification Preferences for Online mHealth Services 2019 Murmann, Patrick
Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model 2019 Farooq, Ali
Automatically Proving Purpose Limitation in Software Architectures 2019 Bavendiek, Kai
Performance of Password Guessing Enumerators Under Cracking Conditions 2019 Valois, Mathieu
Alle Artikel auflisten