![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/isse/isse2013.bht:"
@inproceedings{DBLP:conf/isse/BalboniKM13, author = {Paolo Balboni and Udo Kroon and Milda Macenaite}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Data Protection and Data Security by Design Applied to Financial Intelligence}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {73--85}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_7}, doi = {10.1007/978-3-658-03371-2\_7}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/BalboniKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Berlich13, author = {Peter Berlich}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Executive Career Paths in Information Security Management}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {149--161}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_13}, doi = {10.1007/978-3-658-03371-2\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Berlich13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/EcksteinK13, author = {Levona Eckstein and Reiner Kraft}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {A Practical Approach for an {IT} Security Risk Analysis in Hospitals}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {217--226}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_19}, doi = {10.1007/978-3-658-03371-2\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/EcksteinK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FaberB13, author = {Eberhard von Faber and Wolfgang Behnsen}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {A security Taxonomy that facilitates Protecting an industrial {ICT} Production and how it really provides Transparency}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {87--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_8}, doi = {10.1007/978-3-658-03371-2\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/FaberB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Guarino13, author = {Alessandro Guarino}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Digital Forensics as a Big Data Challenge}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {197--203}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_17}, doi = {10.1007/978-3-658-03371-2\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Guarino13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/KafitzB13, author = {Willi Kafitz and Volker Burgers}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Security in Critical Infrastructures - Future Precondition for Operating License?}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {205--215}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_18}, doi = {10.1007/978-3-658-03371-2\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/KafitzB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/LeontaridisALZY13, author = {Lefteris Leontaridis and Thomas Andersson and Herbert Leitold and Bernd Zwattendorfer and Shuzhe Yang and Pasi Lindholm}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {The {INDI} Ecosystem of privacy-aware, user-centric Identity}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {45--57}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_5}, doi = {10.1007/978-3-658-03371-2\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/LeontaridisALZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Lindemann13, author = {Rolf Lindemann}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {The Evolution of Authentication}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {11--19}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_2}, doi = {10.1007/978-3-658-03371-2\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Lindemann13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/MarkovicD13, author = {Milan Markovic and Goran Dordevic}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Secure Mobile Government and Mobile Banking Systems Based on Android Clients}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {263--273}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_23}, doi = {10.1007/978-3-658-03371-2\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/MarkovicD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Neumann13, author = {Libor Neumann}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Security Challenges of Current Federated eID Architectures}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {21--32}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_3}, doi = {10.1007/978-3-658-03371-2\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Neumann13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Olnes13, author = {Jon {\O}lnes}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {A Practical Signature Policy Framework}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {99--112}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_9}, doi = {10.1007/978-3-658-03371-2\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Olnes13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Pannifer13, author = {Steve Pannifer}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Alternative Authentication - What does it really Provide?}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {121--130}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_11}, doi = {10.1007/978-3-658-03371-2\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Pannifer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/PapadopoulosH13, author = {Dimitrios Papadopoulos and Bernhard M. H{\"{a}}mmerli}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Positioning Information Security Roles, Processes and Interactions}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {163--172}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_14}, doi = {10.1007/978-3-658-03371-2\_14}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/PapadopoulosH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/PeetersPW13, author = {Roel Peeters and Tobias Pulls and Karel Wouters}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Enhancing Transparency with Distributed Privacy-Preserving Logging}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {61--71}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_6}, doi = {10.1007/978-3-658-03371-2\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/PeetersPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Roux13, author = {Yves Le Roux}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Facing the Upheaval: Changing Dynamics for Security Governance in the {EU}}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {113--120}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_10}, doi = {10.1007/978-3-658-03371-2\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Roux13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Schirmer13, author = {Norbert Schirmer}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Safe Browsing}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {173--182}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_15}, doi = {10.1007/978-3-658-03371-2\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/Schirmer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/SelS13, author = {Marc Sel and Tomas Clemente Sanchez}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Worldbank's Secure eID Toolkit for Africa}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {33--44}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_4}, doi = {10.1007/978-3-658-03371-2\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/SelS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Sklavos13, author = {Nicolas Sklavos}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Securing Communication Devices via Physical Unclonable Functions (PUFs)}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {253--261}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_22}, doi = {10.1007/978-3-658-03371-2\_22}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/Sklavos13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/SpeierFBRP13, author = {Andreas Speier and Christofer Fein and David Bothe and Eric Reich and Norbert Pohlmann}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Draft of a Dynamic Malware Detection System on Trustworthy Endpoints}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {3--9}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_1}, doi = {10.1007/978-3-658-03371-2\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/SpeierFBRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/StrackxNVPP13, author = {Raoul Strackx and Job Noorman and Ingrid Verbauwhede and Bart Preneel and Frank Piessens}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Protected Software Module Architectures}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {241--251}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_21}, doi = {10.1007/978-3-658-03371-2\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/StrackxNVPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/VishikSO13, author = {Claire Vishik and Frederick T. Sheldon and David Ott}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {133--147}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_12}, doi = {10.1007/978-3-658-03371-2\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/VishikSO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/VogelB13, author = {Marko Vogel and Vinzent Broer}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Security Compliance Monitoring - The next Evolution of Information Security Management?!}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {183--194}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_16}, doi = {10.1007/978-3-658-03371-2\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/VogelB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Watney13, author = {Murdoch Watney}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {When does Abuse of Social Media constitute a Crime? - {A} South African Legal Perspective within a Global Context}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {227--238}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_20}, doi = {10.1007/978-3-658-03371-2\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/Watney13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isse/2013, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2}, doi = {10.1007/978-3-658-03371-2}, isbn = {978-3-658-03370-5}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.