1
0
0
(1 - 15 von 15
)
A Framework for Evaluating the Usability and the Utility of PKI ...springer.com
link.springer.com
von T Straub · · Zitiert von: 17 — A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications. Tobias Straub &; Harald Baier. Conference paper Accesses. › chapter
Sportabzeichen Berichte – Turnverein Ebersbach e.V.
tv-ebersbach.de
Jürgen-Ralf Weber (5) und Harald Baier (5), Renate Haidle (35), Rolf Bauer (35)
...
Stichwort »Harald Müller Jutta« - Siebenbuerger.de
www.siebenbuerger.de
SbZ-Archiv - Stichwort: »Harald Müller Jutta« ... Katharina Kepp Christel Theil Kreisgruppe Passau Harald Baier Kreisgruppe Regensburg Anneliese Conrad ...
Towards Exact and Inexact Approximate Matching of ...DFRWS
dfrws.org
von L Liebler · Zitiert von: 4 — mrsh-v2 [5]: Frank Breitinger and Harald Baier. Similarity preserving hashing: Eligible properties and a new algorithm mrsh-v2. von F Breitinger · Zitiert von: 33 — =⇒ Approximate matching (similarity hashing, fuzzy hashing). Harald Baier. Database lookup problem / DFRWS-EU, › uploads › › 2019_... › proceedings
Anomaly Detection and Mitigation at Internet Scale: A Survey |...
link.springer.com
Network-based attacks pose a strong threat to the Internet landscape. There are different possibilities to encounter these threats. On the one hand attack...
Stichwort »Regensburg FAsching« - Siebenbuerger.de
www.siebenbuerger.de
Ida Meyndt Kreisgruppe Regensburg Fasching mit ,,Romanticas" Da die ... Christel Theil Kreisgruppe Passau Harald Baier Kreisgruppe Regensburg Anneliese ...
Anomaly Detection and Mitigation at Internet Scale: A SpringerLinklink.springer.com › chapter
link.springer.com
Authors; Authors and affiliations. Jessica Steinberger; Lisa Schehlmann; Sebastian Abt; Harald Baier. Jessica Steinberger. 1. Lisa Schehlmann. 1. Sebastian Abt.
A Framework for Evaluating the Usability and the Utility of...
link.springer.com
Besides the pure technical features, the usability of a PKI-enabled application plays a crucial role since the best security application will fail in practice...
Have a Break – Have a Security Centre: From DZI to CASEDlink.springer.com › chapter
link.springer.com
Have a Break – Have a Security Centre: From DZI to CASED. Harald Baier. Chapter Accesses. Part of the Lecture Notes in Computer Science book series ...
Have a Break – Have a Security Centre: From DZI to CASED
link.springer.com
von H Baier · — Have a Break – Have a Security Centre: From DZI to CASED. Harald Baier. Chapter Accesses. Part of the Lecture Notes in Computer Science book series ... › chapter
Validity Models of Electronic Signatures and Their Enforcement in ...link.springer.com › chapter
link.springer.com
Validity Models of Electronic Signatures and Their Enforcement in Practice. Authors; Authors and affiliations. Harald Baier; Vangelis Karatsiolis. Harald Baier. 1.
Validity Models of Electronic Signatures and Their Enforcement in...
link.springer.com
An electronic signature is considered to be valid, if the signature is mathematically …ct and if the signer’s public key is classified as authentic. While...
Rooting Android – Extending the ADB by an Auto-connecting ...link.springer.com › chapter
link.springer.com
... Android – Extending the ADB by an Auto-connecting WiFi-Accessible Service. Authors; Authors and affiliations. Assem Nazar; Mark M. Seeger; Harald Baier.
Similarity Hashing Based on Levenshtein Distances | SpringerLink
link.springer.com
It is increasingly common in forensic investigations to use automated pre-processing techniques to reduce the massive volumes of data that are encountered....
Similarity Preserving Hashing: Eligible Properties and a New...
link.springer.com
Hash functions are a widespread class of functions in computer science and used in several applications, e.g. in computer forensics to identify known files....
Verwandte Suchanfragen zu Harald Baier
Theodor Wurm Sebastian Gärtner |
Person "Baier" (33) Vorname "Harald" (27867) Name "Baier" (1977) |
sortiert nach Relevanz / Datum