Search dblp for Publications

export results for "toc:db/journals/istr/istr11.bht:"

 download as .bib file

@article{DBLP:journals/istr/AbimbolaMB06,
  author       = {A. A. Abimbola and
                  J. M. Munoz and
                  William J. Buchanan},
  title        = {NetHost-sensor: Monitoring a target host's application via system
                  calls},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {4},
  pages        = {166--175},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.10.003},
  doi          = {10.1016/J.ISTR.2006.10.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AbimbolaMB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Berger06,
  author       = {Brian Berger},
  title        = {Security standards: An end-user perspective},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {3},
  pages        = {129--136},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.05.001},
  doi          = {10.1016/J.ISTR.2006.05.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Berger06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bernecker06,
  author       = {Otto Bernecker},
  title        = {Biometrics: security: An end user perspective},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {3},
  pages        = {111--118},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.05.003},
  doi          = {10.1016/J.ISTR.2006.05.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Bernecker06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BondC06,
  author       = {Mike Bond and
                  Jolyon Clulow},
  title        = {Integrity of intention (a theory of types for security APIs)},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {93--99},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.003},
  doi          = {10.1016/J.ISTR.2006.03.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BondC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Borcea-PfitzmannHLPS06,
  author       = {Katrin Borcea{-}Pfitzmann and
                  Marit Hansen and
                  Katja Liesebach and
                  Andreas Pfitzmann and
                  Sandra Steinbrecher},
  title        = {What user-controlled identity management should learn from communities},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {3},
  pages        = {119--128},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.008},
  doi          = {10.1016/J.ISTR.2006.03.008},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Borcea-PfitzmannHLPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Broderick06,
  author       = {J. Stuart Broderick},
  title        = {ISMS, security standards and security regulations},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {26--31},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2005.12.001},
  doi          = {10.1016/J.ISTR.2005.12.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Broderick06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Charlesworth06,
  author       = {Andrew Charlesworth},
  title        = {The future of {UK} data protection regulation},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {46--54},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2005.12.002},
  doi          = {10.1016/J.ISTR.2005.12.002},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Charlesworth06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Cid06,
  author       = {Carlos Cid},
  title        = {Recent developments in cryptographic hash functions: Security implications
                  and future directions},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {100--107},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.007},
  doi          = {10.1016/J.ISTR.2006.03.007},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Cid06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ciechanowicz06,
  author       = {Chez Ciechanowicz},
  title        = {Editorial},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {1},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.01.002},
  doi          = {10.1016/J.ISTR.2006.01.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ciechanowicz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/EnglandM06,
  author       = {Paul England and
                  John Manferdelli},
  title        = {Virtual machines for enterprise desktop security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {4},
  pages        = {193--202},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.09.001},
  doi          = {10.1016/J.ISTR.2006.09.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/EnglandM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ganley06,
  author       = {Michael J. Ganley},
  title        = {Introduction - Cryptography},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {67},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.005},
  doi          = {10.1016/J.ISTR.2006.03.005},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ganley06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Hardy06,
  author       = {Gary Hardy},
  title        = {Using {IT} governance and {COBIT} to deliver value with {IT} and respond
                  to legal, regulatory and compliance challenges},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {55--61},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2005.12.004},
  doi          = {10.1016/J.ISTR.2005.12.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Hardy06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LaMacchiaM06,
  author       = {Brian A. LaMacchia and
                  John Manferdelli},
  title        = {New Vistas in elliptic curve cryptography},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {4},
  pages        = {186--192},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.09.002},
  doi          = {10.1016/J.ISTR.2006.09.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LaMacchiaM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Lacey06,
  author       = {David Lacey},
  title        = {A new institute for a new millennium},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {62--65},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.01.001},
  doi          = {10.1016/J.ISTR.2006.01.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Lacey06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MayesM06,
  author       = {Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {On the potential of high density smart cards},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {3},
  pages        = {147--153},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.05.002},
  doi          = {10.1016/J.ISTR.2006.05.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MayesM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Paterson06,
  author       = {Kenneth G. Paterson},
  title        = {A cryptographic tour of the IPsec standards},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {72--81},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.004},
  doi          = {10.1016/J.ISTR.2006.03.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Paterson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Phillips06,
  author       = {I. Phillips},
  title        = {Windows Vista security: First impressions},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {4},
  pages        = {176--185},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.10.002},
  doi          = {10.1016/J.ISTR.2006.10.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Phillips06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Pinder06,
  author       = {Phil Pinder},
  title        = {Preparing Information Security for legal and regulatory compliance
                  (Sarbanes-Oxley and Basel {II)}},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {32--38},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2005.12.003},
  doi          = {10.1016/J.ISTR.2005.12.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Pinder06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Price06,
  author       = {Geraint Price},
  title        = {Editorial for v.11 n.4 of the Information Security Technical Report:
                  "Windows Security Revisited"},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {4},
  pages        = {159},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.09.003},
  doi          = {10.1016/J.ISTR.2006.09.003},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Price06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Robshaw06,
  author       = {Matthew J. B. Robshaw},
  title        = {An overview of {RFID} tags and new cryptographic developments},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {82--88},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.006},
  doi          = {10.1016/J.ISTR.2006.03.006},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Robshaw06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Rudinger06,
  author       = {Jens R{\"{u}}dinger},
  title        = {The complexity of {DPA} type side channel attacks and their dependency
                  on the algorithm design},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {3},
  pages        = {154--158},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.05.005},
  doi          = {10.1016/J.ISTR.2006.05.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Rudinger06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Schwiderski-Grosche06,
  author       = {Scarlet Schwiderski{-}Grosche},
  title        = {Security: An end user perspective},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {3},
  pages        = {109--110},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.06.001},
  doi          = {10.1016/J.ISTR.2006.06.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Schwiderski-Grosche06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Sundt06,
  author       = {Chris Sundt},
  title        = {Information security and the law},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {2--9},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2005.11.003},
  doi          = {10.1016/J.ISTR.2005.11.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Sundt06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Walden06,
  author       = {Ian Walden},
  title        = {Communication service providers: Forensic source and investigatory
                  tool},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {10--17},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2005.11.001},
  doi          = {10.1016/J.ISTR.2005.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Walden06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Walton06,
  author       = {Richard Walton},
  title        = {The Computer Misuse Act},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {39--45},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2005.11.002},
  doi          = {10.1016/J.ISTR.2005.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Walton06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Walton06a,
  author       = {Richard Walton},
  title        = {Cryptography and trust},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {68--71},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.002},
  doi          = {10.1016/J.ISTR.2006.03.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Walton06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Ward06,
  author       = {Michael Ward},
  title        = {{EMV} card payments - An update},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {2},
  pages        = {89--92},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.03.001},
  doi          = {10.1016/J.ISTR.2006.03.001},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Ward06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Wolthusen06,
  author       = {Stephen D. Wolthusen},
  title        = {Windows device interface security},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {4},
  pages        = {160--165},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.10.001},
  doi          = {10.1016/J.ISTR.2006.10.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Wolthusen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Wright06,
  author       = {Tim Wright},
  title        = {Security considerations for broadcast systems},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {3},
  pages        = {137--146},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2006.05.004},
  doi          = {10.1016/J.ISTR.2006.05.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Wright06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Zaba06,
  author       = {Stefek Zaba},
  title        = {Digital signature legislation: The first 10 years},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {11},
  number       = {1},
  pages        = {18--25},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.istr.2005.12.005},
  doi          = {10.1016/J.ISTR.2005.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Zaba06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics