521 results on '"Thomas Gross"'
Search Results
52. Interventions over smart card swiping behaviour.
53. Investigation of 3-D secure's model for fraud detection.
54. UniGuard: Protecting Unikernels Using Intel SGX.
55. Why Most Results of Socio-Technical Security User Studies Are False.
56. Interpretable ML-driven Strategy for Automated Trading Pattern Extraction.
57. Beamtenrechtliche Eignung und politische Gesinnung
58. Hashing to Prime in Zero-Knowledge.
59. Investigation of the effect of fear and stress on password choice.
60. Cyber Security and Privacy Experiments: A Design and Reporting Toolkit.
61. Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
62. VirtusCap: Capability-Based Access Control for Unikernels.
63. Investigation of the Effect of Incidental Fear Privacy Behavioral Intention (Technical Report).
64. Investigation of 3-D Secure's Model for Fraud Detection.
65. Detection of FLOSS version release events from Stack Overflow message data.
66. Investigation of the Effect of Fear and Stress on Password Choice (Extended Version).
67. Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studies.
68. A Survey on Hardware Approaches for Remote Attestation in Network Infrastructures.
69. Statistical Reliability of 10 Years of Cyber Security User Studies (Extended Version).
70. Validity and Reliability of the Scale Internet Users' Information Privacy Concern (IUIPC) [Extended Version].
71. GSL: A Cryptographic Library for the strong RSA Graph Signature Scheme.
72. Evaluating BSS algorithms in a mobile context realized by a client-server architecture.
73. Influence tokens: analysing adversarial behaviour change in coloured petri nets.
74. Evidence-Based Methods for Privacy and Identity Management.
75. Evaluating Users' Affect States: Towards a Study on Privacy Concerns.
76. A Survey of Security Analysis in Federated Identity Management.
77. Conservation of the Restricted Expression of Brassicaceae Bsister-Like Genes in Seeds Requires a Transposable Element in Arabidopsis thaliana
78. Why Privacy Is All But Forgotten.
79. Signatures and Efficient Proofs on Committed Graphs and NP-Statements.
80. Blind Source Separation Performance based on Microphone Sensitivity and Orientation within Interaction Devices.
81. Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements.
82. Towards a New Paradigm for Privacy and Security in Cloud Services.
83. Proactive Security Analysis of Changes in Virtualized Infrastructures.
84. 'Schenkelhalsklingen-Cut-in' nach Osteosynthese einer pertrochantären Femurfraktur mittels TFNA©
85. TA Luft und Sterilflanschverbindungen
86. Addressing consumerization of IT risks with nudging
87. Shuttle Peptide Delivers Base Editor RNPs to Rhesus Monkey Airway Epithelial Cells In Vivo
88. Toward a 2D/3D Finite‐Element–Based Digital Shadow for the Approximation of Metrologically Inaccessible Dynamic Fields of State Variables during Heavy Plate Rolling
89. NUI for an Artificial Simulation of an Interactive Sound Source Enhancement to Restore Spatial Listening Experience.
90. Stabilization of Endoscopic Videos using Camera Path from Global Motion Vectors.
91. Optimization of Endoscopic Video Stabilization by Local Motion Exclusion.
92. A Formal Model for Soft Enforcement: Influencing the Decision-Maker.
93. A Decision Making Model of Influencing Behavior in Information Security.
94. Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures.
95. Nudging for Quantitative Access Control Systems.
96. Mental Models for Usable Privacy: A Position Paper.
97. Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs.
98. Defining Privacy Is Supposed to Be Easy.
99. Defense-in-Depth Against Malicious Insiders in the Cloud.
100. Near-Body Measurements in Hypersonic Wedge Flows in the T5 Reflected Shock Tunnel by Tunable Diode Laser Absorption Spectroscopy
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.