


default search action
Information Security Technical Report, Volume 14
Volume 14, Number 1, February 2009
- Igor Muttik, Chris Barton:
Cloud security technologies. 1-6 - David Harley:
Making sense of anti-malware comparative testing. 7-15 - Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer
:
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. 16-29 - Sami Rautiainen:
A look at Portable Document Format vulnerabilities. 30-33
Volume 14, Number 2, May 2009
- Michael J. Ganley:
Introduction to this issue. 35 - Xuefei Leng:
Smart card applications and security. 36-45 - Konstantinos Markantonakis, Michael Tunstall
, Gerhard P. Hancke
, Ioannis G. Askoxylakis, Keith Mayes:
Attacking smart card systems: Theory and practice. 46-56 - Tony Boswell:
Smart card security evaluation: Community solutions to intractable problems. 57-69 - Damien Sauveron:
Multiapplication smart card: Towards an open smart card? 70-78 - Wolfgang Rankl:
How to defend against smartcard attacks - Or the amazing number of different ways to check a PIN securely. 79-86 - Keith Mayes, Konstantinos Markantonakis, Gerhard P. Hancke
:
Transport ticketing security and fraud controls. 87-95 - Ingo Liersch:
Electronic passports - from secure specifications to secure implementations. 96-100 - Serge Chaumette, Damien Sauveron:
Smart cards and remote computing: Interaction or convergence? 101-110
Volume 14, Number 3, August 2009
- Lizzie Coles-Kemp:
The changing shape of privacy and consent. 111-112 - Shirin Elahi:
Privacy and consent in the digital era. 113-118 - Louise Bennett:
Reflections on privacy, identity and consent in on-line services. 119-123 - Jeremy Hilton
:
Improving the secure management of personal data: Privacy on-line IS important, but it's not easy. 124-130 - Andrew Churchill:
'Privacy and public policy delivery - Dichotomy or design'. 131-137 - Nazir A. Malik, Allan Tomlinson:
Privacy and consent in pervasive networks. 138-142 - David G. W. Birch:
Victorian values: Politicians and the public incorrectly see security and privacy as opposites. 143-145 - Robin Wilton:
What's happened to PETs? 146-153 - Edgar A. Whitley
:
Informational privacy, consent and the "control" of personal data. 154-159 - Jo Bryce, Mathias Klang:
Young people, disclosure of personal information and online privacy: Control, choice and consequences. 160-166 - Danijela Bogdanovic, Conn Crawford, Lizzie Coles-Kemp:
The need for enhanced privacy and consent dialogues. 167-172
Volume 14, Number 4, November 2009
- Martin Smith:
Changing staff behaviour. 175 - Steven M. Furnell
:
The irreversible march of technology. 176-180 - Lizzie Coles-Kemp:
Information security management: An entangled research challenge. 181-185 - Carl Colwill:
Human factors in information security: The insider threat - Who can you trust these days? 186-196 - Geordie Stewart:
A safety approach to information security communications. 197-201 - Sameera Mubarak
, Jill Slay
:
Protecting clients from insider attacks on trust accounts. 202-212 - Andrew Jones
:
How do you make information security user friendly? 213-216 - Theodosios Tsiakis
:
Contribution of corporate social responsibility to information security management. 217-222 - Mete Eminagaoglu, Erdem Uçar, Saban Eren:
The positive outcomes of information security awareness training in companies - A case study. 223-229

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.