Search

Your search keyword '"Ron Poet"' showing total 94 results

Search Constraints

Start Over You searched for: Author "Ron Poet" Remove constraint Author: "Ron Poet"
94 results on '"Ron Poet"'

Search Results

29. Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies

36. Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model

37. Permission Management and User Privacy Based On Android

38. Creating Graphical Passwords on a Mobile Phone

39. Hacking Passwords that Satisfy Common Password Policies

40. Is it better to choose seen or unseen distracters for graphical passwords

41. How Dangerous Permissions are Described in Android Apps' Privacy Policies?

42. Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices

43. Formalising identity management protocols

44. A hybrid model of attribute aggregation in federated identity management

45. A Security-Oriented Workflow Framework for Collaborative Environments

46. Security-enabled Enactment of Decentralized Workflows

47. Service-Oriented Workflow Executability from a Security Perspective

48. Analysing Power Consumption Of Different Browsers & Identity Management Systems In Mobile Phones

50. Managing Dynamic Identity Federations using Security Assertion Markup Language

Catalog

Books, media, physical & digital resources