


default search action
Information Security Technical Report, Volume 17
Volume 17, Numbers 1-2, February 2012
- Vladimir Jirasek:

Practical application of information security models. 1-8 - Simon Walker:

Economics and the cyber challenge. 9-18 - Guy Bunker:

Technology is not enough: Taking a holistic view for information assurance. 19-25
- Anika Pflug, Daniel Hartung, Christoph Busch:

Feature extraction from vein images using spatial information and chain codes. 26-35 - Patrick Bours:

Continuous keystroke dynamics: A different perspective towards biometric evaluation. 36-43
- Ethel Quayle

, Max Taylor:
Corrigendum to "Social networking as a nexus for engagement and exploitation of young people" [Inform Secur Tech Rep 16 (2) (2011) 44-50]. 44
Volume 17, Number 3, February 2013
- Ioannis G. Askoxylakis, Mark Manulis

, Joachim Posegga:
Security and privacy for digital ecosystems. 45 - Sherman S. M. Chow

, Man Ho Au
, Willy Susilo
:
Server-aided signatures verification secure against collusion attack. 46-57 - Nikolaos E. Petroulakis

, Elias Z. Tragos, Alexandros G. Fragkiadakis
, George Spanoudakis:
A lightweight framework for secure life-logging in smart environments. 58-70 - Daniel Schreckling, Johannes Köstler, Matthias Schaff:

Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android. 71-80 - Matteo Dell'Amico

, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier:
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems. 81-92 - Luigi Catuogno

, Roberto Gassirà, Michele Masullo, Ivan Visconti:
SmartK: Smart cards in operating systems at kernel level. 93-104 - Delphine Christin

, Pablo Sánchez López, Andreas Reinhardt
, Matthias Hollick
, Michaela Kauer:
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications. 105-116 - Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:

Secure computations on non-integer values with applications to privacy-preserving sequence analysis. 117-128
Volume 17, Number 4, May 2013
- Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro

:
Semantic analysis of role mining results and shadowed roles detection. 131-147 - Anne Baumgrass, Mark Strembeck:

Bridging the gap between role mining and role engineering via migration guides. 148-172 - Jason L. Wright

, Miles McQueen, Lawrence Wellman:
Analyses of two end-user software vulnerability exposure metrics (extended version). 173-184 - Moritz Riesner, Michael Netter, Günther Pernul:

Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments. 185-198 - Daniel Feledi, Stefan Fenz

, Lukas Lechner:
Toward web-based information security knowledge sharing. 199-209 - Amir Herzberg

, Haya Schulmann:
Oblivious and fair server-aided two-party computation. 210-226 - Peter Frühwirt, Peter Kieseberg

, Sebastian Schrittwieser, Markus Huber
, Edgar R. Weippl:
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs. 227-238 - Thomas Plos, Christian Maierhofer:

On measuring the parasitic backscatter of sensor-enabled UHF RFID tags. 239-252

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














