default search action
16th ISSE 2014: Brussels, Belgium
- Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider:
ISSE 2014 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2014 Conference, Brussels, Belgium, October 14-15, 2014. Springer 2014, ISBN 978-3-658-06707-6 - Stacy Simpson:
SAFECode Whitepaper: Fundamental Practices for Secure Software Development 2nd Edition. 1-32 - Eberhard von Faber:
In-House Standardization of Security Measures: Necessity, Benefits and Realworld Obstructions. 35-48 - Eric Baize, Steve Lipner:
An Effective Approach for Assessing the Risk of Acquired IT Products. 49-55 - Christian Schlehuber, Erik Tews, Stefan Katzenbeisser:
IT-Security in Railway Signalling Systems. 56-64 - Alexander Polyakov:
13+ Real Ways to Destroy Business by Breaking Company's SAP Applications. 65-78 - Francisco Jordan, Helena Pujol, David Ruana:
Achieving the eIDAS Vision Through the Mobile, Social and Cloud Triad. 81-93 - Gregor Bühler, Enrico Entschew, Marcel Selhorst:
Security Versus Usability - User-Friendly Qualified Signatures Based on German ID Cards. 94-105 - Marc Sel:
Using the Semantic Web to Generate Trust Indicators. 106-119 - Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. 123-133 - Murdoch Watney:
Restricting Excessive State-on-State Cyber Espionage under International Law: A Quest of Futility? 134-143 - Alexander W. Koehler:
Securing Cloud: Elastic Key Management and Homomorphic Encryption. 144-154 - Norbert Pohlmann, Michael Sparenberg, Illya Siromaschenko, Kilian Kilden:
Secure Communication and Digital Sovereignty in Europe. 155-169 - Arno Fiedler, Christoph Thiel:
The need of European White Knights for the TLS/SSL Certificate System. 170-174 - Steven Ackx:
Emerging Technologies, Disrupt or be Disrupted. 177-187 - Vincent van der Leest, Roel Maes, Geert Jan Schrijen, Pim Tuyls:
Hardware Intrinsic Security to Protect Value in the Mobile Market. 188-198 - Milan Markovic, Goran Dordevic:
On Cross-Border Mobile Government Systems. 199-208 - Anders Andersen, Trygve Hardersen, Norbert Schirmer:
Privacy for Cloud Storage. 211-219 - Christian Thiel, Christoph Thiel:
Enforcing Data Privacy in the Age of Google Glass. 220-229 - Marc Sel, Dusko Karaklajic:
Internet of Trucks and Digital Tachograph - Security and Privacy Threats. 230-238 - Detlef Hühnlein:
Towards eIDAS as a Service. 241-248 - Alessandro Guarino:
What now? Data Retention Scenarios After the ECJ Ruling. 249-255 - Michele Bezzi, Frances Cleary, Luca Compagna:
From Research Results to Strategy: A Mapping Exercise. 256-264
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.