


default search action
15th ISSE 2013: Brussels, Belgium
- Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider:

ISSE 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013. Springer 2013, ISBN 978-3-658-03370-5 - Andreas Speier, Christofer Fein, David Bothe, Eric Reich, Norbert Pohlmann:

Draft of a Dynamic Malware Detection System on Trustworthy Endpoints. 3-9 - Rolf Lindemann:

The Evolution of Authentication. 11-19 - Libor Neumann:

Security Challenges of Current Federated eID Architectures. 21-32 - Marc Sel, Tomas Clemente Sanchez:

Worldbank's Secure eID Toolkit for Africa. 33-44 - Lefteris Leontaridis, Thomas Andersson, Herbert Leitold, Bernd Zwattendorfer, Shuzhe Yang, Pasi Lindholm:

The INDI Ecosystem of privacy-aware, user-centric Identity. 45-57 - Roel Peeters, Tobias Pulls, Karel Wouters:

Enhancing Transparency with Distributed Privacy-Preserving Logging. 61-71 - Paolo Balboni, Udo Kroon, Milda Macenaite:

Data Protection and Data Security by Design Applied to Financial Intelligence. 73-85 - Eberhard von Faber, Wolfgang Behnsen:

A security Taxonomy that facilitates Protecting an industrial ICT Production and how it really provides Transparency. 87-98 - Jon Ølnes:

A Practical Signature Policy Framework. 99-112 - Yves Le Roux:

Facing the Upheaval: Changing Dynamics for Security Governance in the EU. 113-120 - Steve Pannifer:

Alternative Authentication - What does it really Provide? 121-130 - Claire Vishik, Frederick T. Sheldon, David Ott:

Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment. 133-147 - Peter Berlich:

Executive Career Paths in Information Security Management. 149-161 - Dimitrios Papadopoulos, Bernhard M. Hämmerli:

Positioning Information Security Roles, Processes and Interactions. 163-172 - Norbert Schirmer:

Safe Browsing. 173-182 - Marko Vogel, Vinzent Broer:

Security Compliance Monitoring - The next Evolution of Information Security Management?! 183-194 - Alessandro Guarino:

Digital Forensics as a Big Data Challenge. 197-203 - Willi Kafitz, Volker Burgers:

Security in Critical Infrastructures - Future Precondition for Operating License? 205-215 - Levona Eckstein, Reiner Kraft:

A Practical Approach for an IT Security Risk Analysis in Hospitals. 217-226 - Murdoch Watney

:
When does Abuse of Social Media constitute a Crime? - A South African Legal Perspective within a Global Context. 227-238 - Raoul Strackx, Job Noorman, Ingrid Verbauwhede

, Bart Preneel, Frank Piessens:
Protected Software Module Architectures. 241-251 - Nicolas Sklavos:

Securing Communication Devices via Physical Unclonable Functions (PUFs). 253-261 - Milan Markovic, Goran Dordevic:

Secure Mobile Government and Mobile Banking Systems Based on Android Clients. 263-273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














