行业 
领域 
岗位 
类型 全部
-Authentication on the Move Challenges for Mobile Web Applications
下载量:957A1D6BA43E665EBB164149E6CFCFB931E1F5A6浏览量:957A1D6BA43E665EBB164149E6CFCFB931E1F5A6
-The Value of Human Centered Research in Identity and Access Management
下载量:206C67F24890AD4BAE8A65BBAF4D17B80A126EF8浏览量:206C67F24890AD4BAE8A65BBAF4D17B80A126EF8
-Scaling IAM Rules with ML Based Risk Analytics
下载量:F64F23F3519DFC5B20593CD3D5AE34FA4F7DD3FF浏览量:F64F23F3519DFC5B20593CD3D5AE34FA4F7DD3FF
-Managing Self Sovereign Identities A Relying Party Perspective
下载量:2A8DF3F0C5269C44937DE2BC4D1F760BED580DC7浏览量:2A8DF3F0C5269C44937DE2BC4D1F760BED580DC7
-How Generational Psychology Impacts Your Security Strategy
下载量:EC9526059A4CFF43A4E21D6A5191AEC36E0294FF浏览量:EC9526059A4CFF43A4E21D6A5191AEC36E0294FF
-Crushing Biases Why the Digital Identity Industry Needs Diversity
下载量:5C49D1EAAA88EB9F3795F9CAA96EA9AE867EB34C浏览量:5C49D1EAAA88EB9F3795F9CAA96EA9AE867EB34C
-Build Your Own IDaaS Lessons from Year One
下载量:9CC3340F5489F9DD21779358CA616AFB5460F127浏览量:9CC3340F5489F9DD21779358CA616AFB5460F127
-Privacy By Design Lessons from Beyonce
下载量:E4E46C512CF769E491BF101DF7905FC3D305540B浏览量:E4E46C512CF769E491BF101DF7905FC3D305540B
-Leading Change Building a Security Culture of Protect Detect Respond
下载量:6BA053275D5ED372C7122B5EE2466728D7079808浏览量:6BA053275D5ED372C7122B5EE2466728D7079808
-I Had My Mom Break into a Prison.Then We Had Pie
下载量:AC94B1BE13FEFFE9CD0CF546C01744241E0F4B8E浏览量:AC94B1BE13FEFFE9CD0CF546C01744241E0F4B8E
-How To Build Engaging Low Cost Awareness Videos
下载量:7DA6DB4D153FF901017BFCEB174C6B0E5BAC0513浏览量:7DA6DB4D153FF901017BFCEB174C6B0E5BAC0513
-10 Things I Wish Every Developer Knew about Security
下载量:4682B9E6A82CC91B968DB9C8E19946AA7E631A77浏览量:4682B9E6A82CC91B968DB9C8E19946AA7E631A77
-The Attribution Game When Knowing Your Adversary Matters
下载量:2F1AC65E432F1D1C9D3E88216FE347BC2C2F0AE2浏览量:2F1AC65E432F1D1C9D3E88216FE347BC2C2F0AE2
-Nanotechnology Behavior and Supply Chains Managing Risk at a Platform Level
下载量:0593EEB40565BC94E62DF75E7E2A551CD0F10084浏览量:0593EEB40565BC94E62DF75E7E2A551CD0F10084
-Maturing Cyber Risk Management Practices Framework and Next Steps
下载量:C7F9B493FA5EFE18D8C588F3A1A7D27D35318908浏览量:C7F9B493FA5EFE18D8C588F3A1A7D27D35318908
Blissfully-2019全球SaaS趋势报告
下载量:9671341F6D8F472310700AA26168570D3E9736B7浏览量:9671341F6D8F472310700AA26168570D3E9736B7
-SoK A Consensus Taxonomy in the Blockchain Era
下载量:6081B0DBFA37786839CCD97FD64EBD2DA53256C4浏览量:6081B0DBFA37786839CCD97FD64EBD2DA53256C4
-Universally Composable Accumulators
下载量:E4FE749875E76F86F7B47A3B2884E6BBF80C0ABD浏览量:E4FE749875E76F86F7B47A3B2884E6BBF80C0ABD
-Universal Forgery Attack against GCM RUP
下载量:F4C03ABF6C37EB242E7FB822CDBA173EAB3C4719浏览量:F4C03ABF6C37EB242E7FB822CDBA173EAB3C4719
-Traceable Ring Signatures with Post quantum Security
下载量:20AB1E092E98DC3D43D0C9E49E0DAE93C7A104AB浏览量:20AB1E092E98DC3D43D0C9E49E0DAE93C7A104AB
-Traceable Ring Signatures with Post quantum Security
下载量:3B94DE59356C5C9A7F630A06F4A8E2EEF9DC133B浏览量:3B94DE59356C5C9A7F630A06F4A8E2EEF9DC133B
-Ticket Mediated Password Strengthening
下载量:68759653B1C268DCEAFDE14B7A22CF35CCD0A530浏览量:68759653B1C268DCEAFDE14B7A22CF35CCD0A530
-T10 Modeling Memory Faults in Signature and Authenticated Encryption Schemes
下载量:8551589966FCFA609F9F21712EE78E9AFC09F3BB浏览量:8551589966FCFA609F9F21712EE78E9AFC09F3BB
-Post Quantum Provably Secure Authentication and MAC from Mersenne Primes
下载量:7664B6BBD6C9BC7E3DEC145B5F36CC0C76EE269C浏览量:7664B6BBD6C9BC7E3DEC145B5F36CC0C76EE269C
-My Gadget Just Cares For Me How NINA Can Prove Security Against Combined Attacks
下载量:05EBD9DB7E91CC01F7CC33AF901B3F31DBA1E531浏览量:05EBD9DB7E91CC01F7CC33AF901B3F31DBA1E531
-Minimal Assumptions for Fiat Shamir type Signatures and Advances in Garbled RAM Secure Computation
下载量:89D646F10BBDA249752D2A2AC307BC0D5567884A浏览量:89D646F10BBDA249752D2A2AC307BC0D5567884A
-Minimal Assumptions for Fiat Shamir type Signatures and Advances in Garbled RAM Secure Computation
下载量:EC97E2BBFBE4EEF6BB1A7742979069A4BDD8DD6D浏览量:EC97E2BBFBE4EEF6BB1A7742979069A4BDD8DD6D
-Improved Secure Integer Comparison via Homomorphic Encryption
下载量:48AE2A345464848EF020A4EDEBD6605A67C9D47C浏览量:48AE2A345464848EF020A4EDEBD6605A67C9D47C
-Improved Secure Integer Comparison via Homomorphic Encryption
下载量:D7C0CDD7C1B0076DF07A44577212BFBE6C93893E浏览量:D7C0CDD7C1B0076DF07A44577212BFBE6C93893E
-Generic Attack on Iterated Tweakable FX Constructions
下载量:9BCABA839564D60B064A57518EA8AC58C3A5DDE4浏览量:9BCABA839564D60B064A57518EA8AC58C3A5DDE4