default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr13.bht:"
@article{DBLP:journals/istr/Arora08, author = {Siddhartha Arora}, title = {National e-ID card schemes: {A} European overview}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {46--53}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.08.002}, doi = {10.1016/J.ISTR.2008.08.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Arora08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ashenden08, author = {Debi Ashenden}, title = {Information Security management: {A} human challenge?}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {195--201}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.006}, doi = {10.1016/J.ISTR.2008.10.006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ashenden08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BrownP08, author = {Mason Brown and Alan Paller}, title = {Secure software development: Why the development world awoke to the challenge}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {1}, pages = {40--43}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.03.001}, doi = {10.1016/J.ISTR.2008.03.001}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BrownP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChessW08, author = {Brian Chess and Jacob West}, title = {Dynamic taint propagation: Finding vulnerabilities without attacking}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {1}, pages = {33--39}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.02.003}, doi = {10.1016/J.ISTR.2008.02.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChessW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Cleeff08, author = {Andr{\'{e}} van Cleeff}, title = {Future consumer mobile phone security: {A} case study using the data-centric security model}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {112--117}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.003}, doi = {10.1016/J.ISTR.2008.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Cleeff08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CockSP08, author = {Danny De Cock and Koen Simoens and Bart Preneel}, title = {Insights on identity documents based on the Belgian case study}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {54--60}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.06.004}, doi = {10.1016/J.ISTR.2008.06.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CockSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Coles-Kemp08, author = {Lizzie Coles{-}Kemp}, title = {Introduction}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {193--194}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.015}, doi = {10.1016/J.ISTR.2008.10.015}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Coles-Kemp08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Collings08, author = {Tony Collings}, title = {Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID)}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {61--70}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.06.002}, doi = {10.1016/J.ISTR.2008.06.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Collings08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Crinson08, author = {Iain Crinson}, title = {Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: {A} sociomaterial critique}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {202--206}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.007}, doi = {10.1016/J.ISTR.2008.10.007}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Crinson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DesmetJMPPSV08, author = {Lieven Desmet and Wouter Joosen and Fabio Massacci and Pieter Philippaerts and Frank Piessens and Ida Sri Rejeki Siahaan and Dries Vanoverberghe}, title = {Security-by-contract on the .NET platform}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {1}, pages = {25--32}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.02.001}, doi = {10.1016/J.ISTR.2008.02.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DesmetJMPPSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ganley08, author = {Michael J. Ganley}, title = {Introduction to this issue}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {45}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.08.001}, doi = {10.1016/J.ISTR.2008.08.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ganley08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Gollmann08, author = {Dieter Gollmann}, title = {Securing Web applications}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {1}, pages = {1--9}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.02.002}, doi = {10.1016/J.ISTR.2008.02.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Gollmann08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HansenPS08, author = {Marit Hansen and Andreas Pfitzmann and Sandra Steinbrecher}, title = {Identity management throughout one's whole life}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {83--94}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.06.003}, doi = {10.1016/J.ISTR.2008.06.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HansenPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Hert08, author = {Paul de Hert}, title = {Identity management of e-ID, privacy and security in Europe. {A} human rights view}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {71--75}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.07.001}, doi = {10.1016/J.ISTR.2008.07.001}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Hert08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Humphreys08, author = {Edward Humphreys}, title = {Information security management standards: Compliance, governance and risk management}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {247--255}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.010}, doi = {10.1016/J.ISTR.2008.10.010}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Humphreys08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Jones08, author = {Andy Jones}, title = {Catching the malicious insider}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {220--224}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.008}, doi = {10.1016/J.ISTR.2008.10.008}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Jones08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KraussSE08, author = {Christoph Krau{\ss} and Markus Schneider and Claudia Eckert}, title = {On handling insider attacks in wireless sensor networks}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {165--172}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.011}, doi = {10.1016/J.ISTR.2008.10.011}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KraussSE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Leung08, author = {Adrian Leung}, title = {A mobile device management framework for secure service delivery}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {118--126}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.09.003}, doi = {10.1016/J.ISTR.2008.09.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Leung08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LoYY08, author = {Nai{-}Wei Lo and Kuo{-}Hui Yeh and Chan Yeob Yeun}, title = {New mutual agreement protocol to secure mobile RFID-enabled devices}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {151--157}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.09.002}, doi = {10.1016/J.ISTR.2008.09.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LoYY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MacDonald08, author = {John A. MacDonald}, title = {Authentication {\&} key agreement for off-portal mobile applications}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {127--135}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.004}, doi = {10.1016/J.ISTR.2008.10.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MacDonald08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MayesM08, author = {Keith Mayes and Konstantinos Markantonakis}, title = {Mobile communication security controllers an evaluation paper}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {173--192}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.09.004}, doi = {10.1016/J.ISTR.2008.09.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MayesM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MayrhoferG08, author = {Rene Mayrhofer and Hans Gellersen}, title = {Spontaneous mobile device authentication based on sensor data}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {136--150}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.005}, doi = {10.1016/J.ISTR.2008.10.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MayrhoferG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/McDermottKMJK08, author = {John P. McDermott and James Kirby and Bruce E. Montrose and Travis Johnson and Myong H. Kang}, title = {Re-engineering Xen internals for higher-assurance security}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {1}, pages = {17--24}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.01.001}, doi = {10.1016/J.ISTR.2008.01.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/McDermottKMJK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Myhr08, author = {Thomas Myhr}, title = {Legal and organizational challenges and solutions for achieving a pan-European electronic {ID} solution: or {I} am 621216-1318, but {I} am also 161262-43774. Do you know who {I} am?}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {76--82}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.06.001}, doi = {10.1016/J.ISTR.2008.06.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Myhr08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Overill08, author = {Richard E. Overill}, title = {{ISMS} insider intrusion prevention and detection}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {216--219}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.014}, doi = {10.1016/J.ISTR.2008.10.014}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Overill08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Price08, author = {Geraint Price}, title = {The benefits and drawbacks of using electronic identities}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {95--103}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.07.002}, doi = {10.1016/J.ISTR.2008.07.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Price08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ProbstH08, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, title = {An extensible analysable system model}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {235--246}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.012}, doi = {10.1016/J.ISTR.2008.10.012}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ProbstH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SagliettiOP08, author = {Francesca Saglietti and Norbert Oster and Florin Pinte}, title = {White and grey-box verification and validation approaches for safety- and security-critical software systems}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {1}, pages = {10--16}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.03.002}, doi = {10.1016/J.ISTR.2008.03.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SagliettiOP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SteerP08, author = {John Steer and Ashish Popli}, title = {Building secure business applications at Microsoft}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {105--110}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.04.001}, doi = {10.1016/J.ISTR.2008.04.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SteerP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Tomlinson08, author = {Allan Tomlinson}, title = {Developments in mobile communications security}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {111}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.001}, doi = {10.1016/J.ISTR.2008.10.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Tomlinson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Walker08, author = {Terrence Walker}, title = {Practical management of malicious insider threat - An enterprise {CSIRT} perspective}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {225--234}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.013}, doi = {10.1016/J.ISTR.2008.10.013}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Walker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Williams08, author = {Patricia A. H. Williams}, title = {In a 'trusting' environment, everyone is responsible for information security}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {4}, pages = {207--215}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.009}, doi = {10.1016/J.ISTR.2008.10.009}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Williams08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YeunHVK08, author = {Chan Yeob Yeun and Kyusuk Han and Duc{-}Liem Vo and Kwangjo Kim}, title = {Secure authenticated group key agreement protocol in the {MANET} environment}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {3}, pages = {158--164}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.10.002}, doi = {10.1016/J.ISTR.2008.10.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YeunHVK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.