


default search action
16th ISSE 2014: Brussels, Belgium
- Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider:

ISSE 2014 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2014 Conference, Brussels, Belgium, October 14-15, 2014. Springer 2014, ISBN 978-3-658-06707-6 - Stacy Simpson:

SAFECode Whitepaper: Fundamental Practices for Secure Software Development 2nd Edition. 1-32 - Eberhard von Faber:

In-House Standardization of Security Measures: Necessity, Benefits and Realworld Obstructions. 35-48 - Eric Baize, Steve Lipner:

An Effective Approach for Assessing the Risk of Acquired IT Products. 49-55 - Christian Schlehuber, Erik Tews, Stefan Katzenbeisser:

IT-Security in Railway Signalling Systems. 56-64 - Alexander Polyakov:

13+ Real Ways to Destroy Business by Breaking Company's SAP Applications. 65-78 - Francisco Jordan, Helena Pujol, David Ruana:

Achieving the eIDAS Vision Through the Mobile, Social and Cloud Triad. 81-93 - Gregor Bühler, Enrico Entschew, Marcel Selhorst:

Security Versus Usability - User-Friendly Qualified Signatures Based on German ID Cards. 94-105 - Marc Sel:

Using the Semantic Web to Generate Trust Indicators. 106-119 - Steffen Wendzel

, Wojciech Mazurczyk
, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. 123-133 - Murdoch Watney

:
Restricting Excessive State-on-State Cyber Espionage under International Law: A Quest of Futility? 134-143 - Alexander W. Koehler:

Securing Cloud: Elastic Key Management and Homomorphic Encryption. 144-154 - Norbert Pohlmann, Michael Sparenberg, Illya Siromaschenko, Kilian Kilden:

Secure Communication and Digital Sovereignty in Europe. 155-169 - Arno Fiedler, Christoph Thiel:

The need of European White Knights for the TLS/SSL Certificate System. 170-174 - Steven Ackx:

Emerging Technologies, Disrupt or be Disrupted. 177-187 - Vincent van der Leest, Roel Maes

, Geert Jan Schrijen, Pim Tuyls:
Hardware Intrinsic Security to Protect Value in the Mobile Market. 188-198 - Milan Markovic, Goran Dordevic:

On Cross-Border Mobile Government Systems. 199-208 - Anders Andersen, Trygve Hardersen, Norbert Schirmer:

Privacy for Cloud Storage. 211-219 - Christian Thiel, Christoph Thiel:

Enforcing Data Privacy in the Age of Google Glass. 220-229 - Marc Sel, Dusko Karaklajic:

Internet of Trucks and Digital Tachograph - Security and Privacy Threats. 230-238 - Detlef Hühnlein:

Towards eIDAS as a Service. 241-248 - Alessandro Guarino:

What now? Data Retention Scenarios After the ECJ Ruling. 249-255 - Michele Bezzi, Frances Cleary, Luca Compagna:

From Research Results to Strategy: A Mapping Exercise. 256-264

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














