default search action
15th ISSE 2013: Brussels, Belgium
- Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider:
ISSE 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013. Springer 2013, ISBN 978-3-658-03370-5 - Andreas Speier, Christofer Fein, David Bothe, Eric Reich, Norbert Pohlmann:
Draft of a Dynamic Malware Detection System on Trustworthy Endpoints. 3-9 - Rolf Lindemann:
The Evolution of Authentication. 11-19 - Libor Neumann:
Security Challenges of Current Federated eID Architectures. 21-32 - Marc Sel, Tomas Clemente Sanchez:
Worldbank's Secure eID Toolkit for Africa. 33-44 - Lefteris Leontaridis, Thomas Andersson, Herbert Leitold, Bernd Zwattendorfer, Shuzhe Yang, Pasi Lindholm:
The INDI Ecosystem of privacy-aware, user-centric Identity. 45-57 - Roel Peeters, Tobias Pulls, Karel Wouters:
Enhancing Transparency with Distributed Privacy-Preserving Logging. 61-71 - Paolo Balboni, Udo Kroon, Milda Macenaite:
Data Protection and Data Security by Design Applied to Financial Intelligence. 73-85 - Eberhard von Faber, Wolfgang Behnsen:
A security Taxonomy that facilitates Protecting an industrial ICT Production and how it really provides Transparency. 87-98 - Jon Ølnes:
A Practical Signature Policy Framework. 99-112 - Yves Le Roux:
Facing the Upheaval: Changing Dynamics for Security Governance in the EU. 113-120 - Steve Pannifer:
Alternative Authentication - What does it really Provide? 121-130 - Claire Vishik, Frederick T. Sheldon, David Ott:
Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment. 133-147 - Peter Berlich:
Executive Career Paths in Information Security Management. 149-161 - Dimitrios Papadopoulos, Bernhard M. Hämmerli:
Positioning Information Security Roles, Processes and Interactions. 163-172 - Norbert Schirmer:
Safe Browsing. 173-182 - Marko Vogel, Vinzent Broer:
Security Compliance Monitoring - The next Evolution of Information Security Management?! 183-194 - Alessandro Guarino:
Digital Forensics as a Big Data Challenge. 197-203 - Willi Kafitz, Volker Burgers:
Security in Critical Infrastructures - Future Precondition for Operating License? 205-215 - Levona Eckstein, Reiner Kraft:
A Practical Approach for an IT Security Risk Analysis in Hospitals. 217-226 - Murdoch Watney:
When does Abuse of Social Media constitute a Crime? - A South African Legal Perspective within a Global Context. 227-238 - Raoul Strackx, Job Noorman, Ingrid Verbauwhede, Bart Preneel, Frank Piessens:
Protected Software Module Architectures. 241-251 - Nicolas Sklavos:
Securing Communication Devices via Physical Unclonable Functions (PUFs). 253-261 - Milan Markovic, Goran Dordevic:
Secure Mobile Government and Mobile Banking Systems Based on Android Clients. 263-273
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.