Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr11.bht:"
@article{DBLP:journals/istr/AbimbolaMB06, author = {A. A. Abimbola and J. M. Munoz and William J. Buchanan}, title = {NetHost-sensor: Monitoring a target host's application via system calls}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {4}, pages = {166--175}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.10.003}, doi = {10.1016/J.ISTR.2006.10.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AbimbolaMB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Berger06, author = {Brian Berger}, title = {Security standards: An end-user perspective}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {3}, pages = {129--136}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.05.001}, doi = {10.1016/J.ISTR.2006.05.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Berger06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bernecker06, author = {Otto Bernecker}, title = {Biometrics: security: An end user perspective}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {3}, pages = {111--118}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.05.003}, doi = {10.1016/J.ISTR.2006.05.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Bernecker06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BondC06, author = {Mike Bond and Jolyon Clulow}, title = {Integrity of intention (a theory of types for security APIs)}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {93--99}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.003}, doi = {10.1016/J.ISTR.2006.03.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BondC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Borcea-PfitzmannHLPS06, author = {Katrin Borcea{-}Pfitzmann and Marit Hansen and Katja Liesebach and Andreas Pfitzmann and Sandra Steinbrecher}, title = {What user-controlled identity management should learn from communities}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {3}, pages = {119--128}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.008}, doi = {10.1016/J.ISTR.2006.03.008}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Borcea-PfitzmannHLPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Broderick06, author = {J. Stuart Broderick}, title = {ISMS, security standards and security regulations}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {26--31}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2005.12.001}, doi = {10.1016/J.ISTR.2005.12.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Broderick06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Charlesworth06, author = {Andrew Charlesworth}, title = {The future of {UK} data protection regulation}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {46--54}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2005.12.002}, doi = {10.1016/J.ISTR.2005.12.002}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Charlesworth06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Cid06, author = {Carlos Cid}, title = {Recent developments in cryptographic hash functions: Security implications and future directions}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {100--107}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.007}, doi = {10.1016/J.ISTR.2006.03.007}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Cid06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ciechanowicz06, author = {Chez Ciechanowicz}, title = {Editorial}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {1}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.01.002}, doi = {10.1016/J.ISTR.2006.01.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ciechanowicz06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/EnglandM06, author = {Paul England and John Manferdelli}, title = {Virtual machines for enterprise desktop security}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {4}, pages = {193--202}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.09.001}, doi = {10.1016/J.ISTR.2006.09.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/EnglandM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ganley06, author = {Michael J. Ganley}, title = {Introduction - Cryptography}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {67}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.005}, doi = {10.1016/J.ISTR.2006.03.005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ganley06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Hardy06, author = {Gary Hardy}, title = {Using {IT} governance and {COBIT} to deliver value with {IT} and respond to legal, regulatory and compliance challenges}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {55--61}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2005.12.004}, doi = {10.1016/J.ISTR.2005.12.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Hardy06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LaMacchiaM06, author = {Brian A. LaMacchia and John Manferdelli}, title = {New Vistas in elliptic curve cryptography}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {4}, pages = {186--192}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.09.002}, doi = {10.1016/J.ISTR.2006.09.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LaMacchiaM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Lacey06, author = {David Lacey}, title = {A new institute for a new millennium}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {62--65}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.01.001}, doi = {10.1016/J.ISTR.2006.01.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Lacey06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MayesM06, author = {Keith Mayes and Konstantinos Markantonakis}, title = {On the potential of high density smart cards}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {3}, pages = {147--153}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.05.002}, doi = {10.1016/J.ISTR.2006.05.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MayesM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Paterson06, author = {Kenneth G. Paterson}, title = {A cryptographic tour of the IPsec standards}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {72--81}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.004}, doi = {10.1016/J.ISTR.2006.03.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Paterson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Phillips06, author = {I. Phillips}, title = {Windows Vista security: First impressions}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {4}, pages = {176--185}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.10.002}, doi = {10.1016/J.ISTR.2006.10.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Phillips06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Pinder06, author = {Phil Pinder}, title = {Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel {II)}}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {32--38}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2005.12.003}, doi = {10.1016/J.ISTR.2005.12.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Pinder06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Price06, author = {Geraint Price}, title = {Editorial for v.11 n.4 of the Information Security Technical Report: "Windows Security Revisited"}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {4}, pages = {159}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.09.003}, doi = {10.1016/J.ISTR.2006.09.003}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Price06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Robshaw06, author = {Matthew J. B. Robshaw}, title = {An overview of {RFID} tags and new cryptographic developments}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {82--88}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.006}, doi = {10.1016/J.ISTR.2006.03.006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Robshaw06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Rudinger06, author = {Jens R{\"{u}}dinger}, title = {The complexity of {DPA} type side channel attacks and their dependency on the algorithm design}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {3}, pages = {154--158}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.05.005}, doi = {10.1016/J.ISTR.2006.05.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Rudinger06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Schwiderski-Grosche06, author = {Scarlet Schwiderski{-}Grosche}, title = {Security: An end user perspective}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {3}, pages = {109--110}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.06.001}, doi = {10.1016/J.ISTR.2006.06.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Schwiderski-Grosche06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Sundt06, author = {Chris Sundt}, title = {Information security and the law}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {2--9}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2005.11.003}, doi = {10.1016/J.ISTR.2005.11.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Sundt06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Walden06, author = {Ian Walden}, title = {Communication service providers: Forensic source and investigatory tool}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {10--17}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2005.11.001}, doi = {10.1016/J.ISTR.2005.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Walden06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Walton06, author = {Richard Walton}, title = {The Computer Misuse Act}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {39--45}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2005.11.002}, doi = {10.1016/J.ISTR.2005.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Walton06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Walton06a, author = {Richard Walton}, title = {Cryptography and trust}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {68--71}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.002}, doi = {10.1016/J.ISTR.2006.03.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Walton06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Ward06, author = {Michael Ward}, title = {{EMV} card payments - An update}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {89--92}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.001}, doi = {10.1016/J.ISTR.2006.03.001}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Ward06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Wolthusen06, author = {Stephen D. Wolthusen}, title = {Windows device interface security}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {4}, pages = {160--165}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.10.001}, doi = {10.1016/J.ISTR.2006.10.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Wolthusen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Wright06, author = {Tim Wright}, title = {Security considerations for broadcast systems}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {3}, pages = {137--146}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.05.004}, doi = {10.1016/J.ISTR.2006.05.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Wright06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Zaba06, author = {Stefek Zaba}, title = {Digital signature legislation: The first 10 years}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {1}, pages = {18--25}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2005.12.005}, doi = {10.1016/J.ISTR.2005.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Zaba06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.