共 50 条
- [41] Integrating Facial Cues of Threat into Security Warnings-An fMRI and Field Study [J]. AMCIS 2016 PROCEEDINGS, 2016,
- [43] Design and Evaluation of Multi-Media Security Warnings for the Interaction between Humans and Industrial Robots [J]. INTELLIGENT ROBOTS AND COMPUTER VISION XXVIII: ALGORITHMS AND TECHNIQUES, 2011, 7878
- [44] An Extensive Study on Various Cryptographic Alogrithms and its Impact on Cloud Computing Security [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 50 - 55
- [45] Does physical security of cryptographic devices need a formal study? (Invited talk) [J]. INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 70 - 70
- [47] Efficient PRNG Design and Implementation for Various High Throughput Cryptographic and Low Power Security Applications [J]. 2019 29TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA), 2019, : 99 - 104
- [48] Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
- [50] Large-scale Randomness Study of Security Margins for 100+Cryptographic Functions [J]. SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 134 - 146