Security Patterns

Results: 182



#Item
1Using Fraud Patterns for Fraud Risk Assessment of E-services Ahmed Seid Yesuf, Jetzabel Serna-Olvera and Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security, Goethe University Frankfurt, Fran

Using Fraud Patterns for Fraud Risk Assessment of E-services Ahmed Seid Yesuf, Jetzabel Serna-Olvera and Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security, Goethe University Frankfurt, Fran

Add to Reading List

Source URL: m-chair.de

Language: English - Date: 2017-07-31 16:44:18
    2Income distribution patterns from a complete social security database

    Income distribution patterns from a complete social security database

    Add to Reading List

    Source URL: adatbank.transindex.ro

    - Date: 2015-12-02 05:14:54
      3LNCSQuantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach

      LNCSQuantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach

      Add to Reading List

      Source URL: java.uom.gr

      - Date: 2015-11-06 10:19:42
        4Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch

        Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, and Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Boch

        Add to Reading List

        Source URL: ei.rub.de

        - Date: 2013-09-26 05:07:39
          5Patterns for Aligning Security and Usability [Poster] Simson L. Garfinkel Robert C. Miller

          Patterns for Aligning Security and Usability [Poster] Simson L. Garfinkel Robert C. Miller

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          - Date: 2005-06-21 09:58:18
            6How Safe are Australian Children in the Internet Age? Research and safety advice by ESET on online behaviour patterns and the security risks Australian children face

            How Safe are Australian Children in the Internet Age? Research and safety advice by ESET on online behaviour patterns and the security risks Australian children face

            Add to Reading List

            Source URL: www.welivesecurity.com

            Language: English - Date: 2015-12-16 12:44:23
            7Microsoft Word - review18.doc

            Microsoft Word - review18.doc

            Add to Reading List

            Source URL: www.jot.fm

            Language: English - Date: 2007-08-10 10:58:07
            8Learning Multi-scale Block Local Binary Patterns for Face Recognition Shengcai Liao, Xiangxin Zhu, Zhen Lei, Lun Zhang, and Stan Z. Li Center for Biometrics and Security Research & National Laboratory of Pattern Recognit

            Learning Multi-scale Block Local Binary Patterns for Face Recognition Shengcai Liao, Xiangxin Zhu, Zhen Lei, Lun Zhang, and Stan Z. Li Center for Biometrics and Security Research & National Laboratory of Pattern Recognit

            Add to Reading List

            Source URL: www.cbsr.ia.ac.cn

            Language: English - Date: 2007-09-09 11:28:31
            9trust claims buffer overrun  tokens

            trust claims buffer overrun tokens

            Add to Reading List

            Source URL: www.soaschool.com

            Language: English - Date: 2013-01-08 15:17:40
            10On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

            On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

            Add to Reading List

            Source URL: vialab.science.uoit.ca

            Language: English - Date: 2015-09-22 16:31:59