The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISSE"( http://dblp.L3S.de/Venues/ISSE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isse

Publication years (Num. hits)
2004 (35) 2006 (50) 2007 (47) 2008 (44) 2009 (36) 2010 (40) 2011-2012 (32) 2013 (24) 2014 (23) 2015 (104) 2016 (72) 2019 (76) 2020 (51) 2021 (53)
Publication types (Num. hits)
inproceedings(673) proceedings(14)
Venues (Conferences, Journals, ...)
ISSE(687)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 687 publication records. Showing 687 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nicolas Sklavos 0001 Securing Communication Devices via Physical Unclonable Functions (PUFs). Search on Bibsonomy ISSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lefteris Leontaridis, Thomas Andersson, Herbert Leitold, Bernd Zwattendorfer, Shuzhe Yang, Pasi Lindholm The INDI Ecosystem of privacy-aware, user-centric Identity. Search on Bibsonomy ISSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Willi Kafitz, Volker Burgers Security in Critical Infrastructures - Future Precondition for Operating License? Search on Bibsonomy ISSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muhammad Asim 0007, R. Paul Koster, Milan Petkovic, Martin Rosner eConsent Management and Enforcement in Personal Telehealth. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Claire Vishik, Ruby B. Lee, Fred Chong Building Technologies that Help Cyber-Defense: Hardware-enabled Trust. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mechthild Stöwer, Reiner Kraft IT Security Investment and Costing Emphasizing Benefits in Times of Limited Budgets. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eberhard von Faber, Wolfgang Behnsen A Systematic Holistic Approach for Providers to Deliver Secure ICT Services. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marc Sel e-Identity - Monetization and Interoperability. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Manuel García-Cervigón, Roberto Morales Malware Detection in Ubiquitous Environments. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Claire Vishik, David Ott, David Grawrock Intention Semantics and Trust Evidence. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thomas Esbach, Walter Fumy, Olga Kulikovska, Dominik Merli, Dieter Schuster, Frederic Stumpf A New Security Architecture for Smartcards Utilizing PUFs. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Florian Skopik, Thomas Bleier, Roman Fiedler Information Management and Sharing for National Cyber Situational Awareness. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Gröne, Marcel Winandy Applying a Security Kernel Framework to Smart Meter Gateways. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dieter Bong, Andreas Philipp Securing the Smart Grid with Hardware Security Modules. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Frederik Humpert-Vrielink, Nina Vrielink A Modern Approach on Information Security Measurement. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ammar Alkassar, Steffen Schulz 0001, Christian Stüble, Sven Wohlgemuth Securing Smartphone Compartments: Approaches and Solutions. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ulrich Lang 0001, Rudolf Schreiner Implementing Least Privilege for Interconnected, Agile SOAs/Clouds. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Enno Rey, Pascal Turbing, Daniel Mende, Matthias Luft Exploiting Virtual File Formats for Fun and Profit. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cataldo Basile, Antonio Lioy, Stefano Paraboschi The PoSecCo Security Decision Support System. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alfredo Rial, George Danezis Privacy-Preserving Smart Metering. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Patrick Michaelis Enterprise Mobility - A Balancing Act between Security and Usability. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Markus Bartsch Smart Metering, Common Criteria and European Privacy Needs. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Philip Hoyer Management and Use of ID Credentials on NFC Enabled Phones: Use Cases, Challenges, Technologies and Standards. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Werner Wüpper, Iryna Windhorst Information Security Management - Best Practice Guidelines for Managers. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Libor Neumann, Tomás Halman, Pavel Rotek, Alexander Boettcher, Julian Stecklina, Michal Sojka, David Nuñez 0001, Isaac Agudo Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Elham Rajabian Noghondar, Konrad Marfurt, Bernhard M. Hämmerli The Human Aspect in Data Leakage Prevention in Academia. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thorsten Scharmatinat Data Loss Prevention in Real Life. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider 0001 (eds.) ISSE 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012 Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lenka Fibíková, Roland Müller Threats, Risks and the Derived Information Security Strategy. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jon Ølnes PEPPOL - Experience from Four Years Work on eSignature Interoperability. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Juan Carlos Cruellas, Andrea Caccia, Konrad Lanz, Giulana Marzola, Luigi Rizzo, Laurent Velez ETSI STF 428 - Accelerating Deployment of Interoperable Electronic Signatures in Europe. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Václav Jirovský Anonymous, a new Civil Disobedience Phenomenon. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel Borleteau, Nicolas Bousquet, Thierry Crespo, Xavier Dubarry, Jan Eichholz, Virginie Galindo Security of Mobile Devices, Applications and Transactions. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sebastian Feld, Norbert Pohlmann, Michael Sparenberg, Bastian C. Wichmann Analyzing G-20's Key Autonomus Systems and their Intermeshing using As-Analyzer. Search on Bibsonomy ISSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider 0001 (eds.) ISSE 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010 Search on Bibsonomy ISSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Scott Howard SCADA and Control System Security: New Standards Protecting Old Technology. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Patrick Koeberl, Jiangtao Li 0001, Anand Rajan, Claire Vishik Silicon PUFs in Practice. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jean-Christophe R. Pazzaglia, Volkmar Lotz, V. Campos Cerda, Ernesto Damiani, Claudio A. Ardagna, Sigrid Gürgens, Antonio Maña, Claudia Pandolfo, George Spanoudakis, Franco Guida, Renato Menicocci Advanced Security Service cERTificate for SOA: Certified Services go Digital. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Timothy Casey, Patrick Koeberl, Claire Vishik Defining Threat Agents: Towards a More Complete Threat Analysis. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bernhard Weiss Secure Networking is the Key to German Public e-Health Solution: Migration Towards an Integrated e-Health Infrastructure. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ingo Bente, Jörg Vieweg, Josef von Helden Countering Phishing with TPM-bound Credentials. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ulrich Lang 0001 Cloud & SOA Application Security as a Service. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jens Terboven Postident Online with the new Personal Identity Card. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Luciana Costa, Roberta D'Amico Malware Detection and Prevention Platform: Telecom Italia Case Study. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ulrich Flegel Privacy Compliant Internal Fraud Screening. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Paolo Balboni Data Protection and Data Security Issues Related to Cloud Computing in the EU. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eberhard von Faber, Michael Pauly User Risk Management Strategies and Models - Adaption for Cloud Computing. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Santiago Uriel Arias Taking Signatures Seriously - Combining Biometric and Digital Signatures. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nick Pope Visual Representation of Advanced Electronic Signatures. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kristian Beckers, Jan Jürjens Security and Compliance in Clouds. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Brindley Authentication and Trust: Turning the Cloud inside out. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rosalia D'Alessandro, Manuel Leone A Mechanism for e-Banking Frauds Prevention and User Privacy Protection. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ulrich Hamann Germany on the Road to Electronic Proof of Identity. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Roberto Morales, Jetzabel M. Serna, Manel Medina A Policy-based Authorization Scheme for Resource Sharing in Pervasive Environments. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Philip Hoyer DSKPP and PSKC, IETF Standard Protocol and Payload for Symmetric Key Provisioning. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Herbert Leitold, Bernd Zwattendorfer STORK: Architecture, Implementation and Pilots. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rolf von Roessing Applying BMIS to Cloud Security. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Volker Reible, Andre Braunmandl The eID Function of the nPA within the European STORK Infrastructure. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider 0001 (eds.) ISSE 2009 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2009 Conference, The Hague, The Netherlands, October 6-8, 2009 Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marek Jawurek, Martin Johns Security Challenges of a Changing Energy Landscape. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Rossberg, Günter Schäfer, Kai Martius Automatic Configuration of Complex IPsec-VPNs and Implications to Higher Layer Network Management. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ann Cavoukian Privacy by Design: Best Practices for Privacy and the Smart Grid. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Johannes Wiele The Mask of the Honorable Citizen. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sibylle Hick, Fares Rahmun, Ernest Hammerschmidt Visa Applications in TG Biometrics for Public Sector Applications. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bernhard M. Hämmerli, Henning H. Arendt Critical Infrastructure in Finance PARSIFAL Recommendations. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sebastian Feld, Norbert Pohlmann Security Analysis of OpenID, followed by a Reference Implementation of an nPA-based OpenID Provider. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thomas Rössler, Arne Tauber The SPOCS Interoperability Framework: Interoperability of eDocuments and eDelivery Systems taken as Example. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marcus Lasance Single Sign-on(SSO) to Cloud based Services and Legacy Applications "Hitting the IAM wall". Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marian Margraf The New German ID Card. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Matthias Luft, Thorsten Holz A Small Leak will Sink a Great Ship: An Empirical Study of DLP Solutions. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marit Hansen Towards Future-Proof Privacy-Respecting Identity Management Systems. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Werner Braun, Dirk Arendt AusweisApp and the eID Service/Server - Online Identification Finally more Secure. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jan Eichholz, Detlef Hühnlein, Gisela Meister, Johannes Schmölz New Authentication Concepts for Electronic Identity Tokens. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lenka Fibíková, Roland Müller A Simplified Approach for Classifying Applications. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Miroslaw Kutylowski, Przemyslaw Kubiak 0001 Polish Concepts for Securing E-Government Document Flow. Search on Bibsonomy ISSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1John Colley Why Secure Coding is not Enough: Professionals' Perspective. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Franco Ruggieri ETSI Specifications for Registered E-Mail REM. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Detlef Houdeau Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rolf von Roessing The ISACA Business Model for Information Security: An Integrative and Innovative Approach. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Reinder Wolthuis, Gerben Broenink, Frank Fransen, Sven Schultz, Arnout de Vries Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gerry Gebel, Alice Wang Entitlement Management: Ready to Enter the IdM Mainstream. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wendy Goucher The Operational Manager - Enemy or Hero of Secure Business Practice? Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marc Sel, Kristof Van Der Auwera Demystifying SAP security. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Walter Peissl Privacy and Security - a Way to Manage the Dilemma. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dave Singelée, Stefaan Seys User Privacy in RFID Networks. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jon Ølnes, Leif Buene, Anette Andresen, Håvard Grindheim, Jörg Apitzsch, Adriano Rossi A General Quality Classification System for eIDs and e-Signatures. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mathias Neuhaus, Jörg Wolff, Norbert Zisky Proposal for an IT Security Standard for Preventing Tax Fraud in Cash Registers. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Phil D'Angio, Panos Vassilliadas, Phaidon Kaklamanis PKI - Crawling Out of the Grave & Into the Arms of Government. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nick Pope Protecting Long Term Validity of PDF documents with PAdES-LTV. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Endre Bangerter, Manuel Barbosa, Daniel J. Bernstein, Ivan Damgård, Daniel Page, Jakob Illeborg Pagter, Ahmad-Reza Sadeghi, Sampo Sovio Using Compilers to Enhance Cryptographic Product Development. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Philip Hoyer ROI, Pitfalls and Best Practices with an Enterprise Smart Card Deployment. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Werner Degenhardt, Johannes Wiele Social Engineering hits Social Commerce. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider 0001 (eds.) ISSE 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Vittorio Bertocci Claims and Identity: On-Premise and Cloud Solutions. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Klaus Schmeh A Taxonomy of Cryptographic Techniques for Securing Electronic Identity Documents. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Kai Wimmer Secure Network Zones. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ton van Opstal A Structured Approach to Software Security. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Arno Fiedler, Selma Gralher Acceptance of Trust Domains in IT-Infrastructures. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eberhard von Faber Measuring Information Security: Guidelines to Build Metrics. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Claire Vishik, Giusella Finocchiaro Relative Anonymity: Measuring Degrees of Anonymity in Diverse Computing Environment. Search on Bibsonomy ISSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 687 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license