Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/isse/isse2009.bht:"
@proceedings{DBLP:conf/isse/2009, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, publisher = {Vieweg+Teubner}, year = {2010}, url = {https://doi.org/10.1007/978-3-8348-9363-5}, doi = {10.1007/978-3-8348-9363-5}, isbn = {978-3-8348-0958-2}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BangerterBBDPPS09, author = {Endre Bangerter and Manuel Barbosa and Daniel J. Bernstein and Ivan Damg{\aa}rd and Daniel Page and Jakob Illeborg Pagter and Ahmad{-}Reza Sadeghi and Sampo Sovio}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Using Compilers to Enhance Cryptographic Product Development}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {291--301}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_29}, doi = {10.1007/978-3-8348-9363-5\_29}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/BangerterBBDPPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Bertocci09, author = {Vittorio Bertocci}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Claims and Identity: On-Premise and Cloud Solutions}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {1--13}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_1}, doi = {10.1007/978-3-8348-9363-5\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Bertocci09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BeyerW09, author = {Anja Beyer and Christiane Westendorf}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {How to Establish Security Awareness in Schools}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {177--186}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_17}, doi = {10.1007/978-3-8348-9363-5\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/BeyerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Cavenne09, author = {Fabien Cavenne}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{ICT} Systems Contributing to European Secure-by-Design Critical Infrastructures}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {48--62}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_5}, doi = {10.1007/978-3-8348-9363-5\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Cavenne09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Colley09, author = {John Colley}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Why Secure Coding is not Enough: Professionals' Perspective}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {302--311}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_30}, doi = {10.1007/978-3-8348-9363-5\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Colley09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/DAngioVK09, author = {Phil D'Angio and Panos Vassilliadas and Phaidon Kaklamanis}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{PKI} - Crawling Out of the Grave {\&} Into the Arms of Government}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {108--115}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_10}, doi = {10.1007/978-3-8348-9363-5\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/DAngioVK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/DegenhardtW09, author = {Werner Degenhardt and Johannes Wiele}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Social Engineering hits Social Commerce}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {169--176}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_16}, doi = {10.1007/978-3-8348-9363-5\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/DegenhardtW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/DumortierR09, author = {Jos Dumortier and Frank Robben}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {User and Access Management in Belgian e-Government}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {97--107}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_9}, doi = {10.1007/978-3-8348-9363-5\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/DumortierR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Faber09, author = {Eberhard von Faber}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Measuring Information Security: Guidelines to Build Metrics}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {17--26}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_2}, doi = {10.1007/978-3-8348-9363-5\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Faber09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FiedlerG09, author = {Arno Fiedler and Selma Gralher}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Acceptance of Trust Domains in IT-Infrastructures}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {255--261}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_25}, doi = {10.1007/978-3-8348-9363-5\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/FiedlerG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/GebelW09, author = {Gerry Gebel and Alice Wang}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Entitlement Management: Ready to Enter the IdM Mainstream}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {116--124}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_11}, doi = {10.1007/978-3-8348-9363-5\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/GebelW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Goucher09, author = {Wendy Goucher}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {The Operational Manager - Enemy or Hero of Secure Business Practice?}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {270--278}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_27}, doi = {10.1007/978-3-8348-9363-5\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Goucher09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/GutierrezPL09, author = {Manuel Garc{\'{\i}}a{-}Cervig{\'{o}}n Guti{\'{e}}rrez and Juan V{\'{a}}zquez Pongilupi and Manel Medina Llin{\`{a}}s}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Web Sessions Anomaly Detection in Dynamic Environments}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {216--220}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_21}, doi = {10.1007/978-3-8348-9363-5\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/GutierrezPL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/HohgrafeJ09, author = {Bernd Hohgr{\"{a}}fe and Sebastian Jacobi}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Voice Biometrics as a Way to Self-service Password Reset}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {137--144}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_13}, doi = {10.1007/978-3-8348-9363-5\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/HohgrafeJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Houdeau09, author = {Detlef Houdeau}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {87--93}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_8}, doi = {10.1007/978-3-8348-9363-5\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Houdeau09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Hoyer09, author = {Philip Hoyer}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {63--71}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_6}, doi = {10.1007/978-3-8348-9363-5\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Hoyer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/MenzelTSSM09, author = {Michael Menzel and Ivonne Thomas and Benjamin Sch{\"{u}}ler and Maxim Schnjakin and Christoph Meinel}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Security Requirements Specification in Process-aware Information Systems}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {145--154}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_14}, doi = {10.1007/978-3-8348-9363-5\_14}, timestamp = {Wed, 20 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/MenzelTSSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/NeuhausWZ09, author = {Mathias Neuhaus and J{\"{o}}rg Wolff and Norbert Zisky}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Proposal for an {IT} Security Standard for Preventing Tax Fraud in Cash Registers}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {262--269}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_26}, doi = {10.1007/978-3-8348-9363-5\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/NeuhausWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Oczko09, author = {Martin Oczko}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {KryptoNAS: Open source based {NAS} encryption}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {223--229}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_22}, doi = {10.1007/978-3-8348-9363-5\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Oczko09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/OlnesBAGAR09, author = {Jon {\O}lnes and Leif Buene and Anette Andresen and H{\aa}vard Grindheim and J{\"{o}}rg Apitzsch and Adriano Rossi}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {A General Quality Classification System for eIDs and e-Signatures}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {72--86}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_7}, doi = {10.1007/978-3-8348-9363-5\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/OlnesBAGAR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Opstal09, author = {Ton van Opstal}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {A Structured Approach to Software Security}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {281--290}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_28}, doi = {10.1007/978-3-8348-9363-5\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Opstal09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Peissl09, author = {Walter Peissl}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Privacy and Security - a Way to Manage the Dilemma}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {187--196}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_18}, doi = {10.1007/978-3-8348-9363-5\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Peissl09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Pope09, author = {Nick Pope}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Protecting Long Term Validity of {PDF} documents with PAdES-LTV}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {320--327}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_32}, doi = {10.1007/978-3-8348-9363-5\_32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Pope09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Roessing09, author = {Rolf von Roessing}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {The {ISACA} Business Model for Information Security: An Integrative and Innovative Approach}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {37--47}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_4}, doi = {10.1007/978-3-8348-9363-5\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Roessing09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Ruggieri09, author = {Franco Ruggieri}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{ETSI} Specifications for Registered E-Mail {REM}}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {242--254}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_24}, doi = {10.1007/978-3-8348-9363-5\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Ruggieri09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/SadeghiVV09, author = {Ahmad{-}Reza Sadeghi and Ingrid Verbauwhede and Claire Vishik}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Future of Assurance: Ensuring that a System is Trustworthy}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {339--348}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_34}, doi = {10.1007/978-3-8348-9363-5\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/SadeghiVV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Schmeh09, author = {Klaus Schmeh}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {349--356}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_35}, doi = {10.1007/978-3-8348-9363-5\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Schmeh09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/SelA09, author = {Marc Sel and Kristof Van Der Auwera}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Demystifying {SAP} security}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {27--36}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_3}, doi = {10.1007/978-3-8348-9363-5\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/SelA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/SingeleeS09, author = {Dave Singel{\'{e}}e and Stefaan Seys}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {User Privacy in {RFID} Networks}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {206--215}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_20}, doi = {10.1007/978-3-8348-9363-5\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/SingeleeS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Takanen09, author = {Ari Takanen}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Proactive Security Testing and Fuzzing}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {312--319}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_31}, doi = {10.1007/978-3-8348-9363-5\_31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Takanen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/VishikF09, author = {Claire Vishik and Giusella Finocchiaro}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {197--205}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_19}, doi = {10.1007/978-3-8348-9363-5\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/VishikF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/WichmannHHJ09, author = {Markus Wichmann and Guido von der Heidt and Carsten Hille and Gunnar Jacobson}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Secure E-Mail Communication across Company Boundaries Experiences and Architectures}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {125--136}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_12}, doi = {10.1007/978-3-8348-9363-5\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/WichmannHHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Wimmer09, author = {Peter Kai Wimmer}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Secure Network Zones}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {230--241}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_23}, doi = {10.1007/978-3-8348-9363-5\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Wimmer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/WolthuisBFSV09, author = {Reinder Wolthuis and Gerben Broenink and Frank Fransen and Sven Schultz and Arnout de Vries}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {Simple {\&} Secure: Attitude and behaviour towards security and usability in internet products and services at home}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {157--168}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_15}, doi = {10.1007/978-3-8348-9363-5\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/WolthuisBFSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Wyseur09, author = {Brecht Wyseur}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{RE-TRUST:} Trustworthy Execution of {SW} on Remote Untrusted Platforms}, booktitle = {{ISSE} 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009}, pages = {328--338}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9363-5\_33}, doi = {10.1007/978-3-8348-9363-5\_33}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Wyseur09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.