- 2006
- Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandro:
A Face Recognition System for Mobile Phones. ISSE 2006: 211-217 - Shahbaz Ali, Jon G. Hall
:
Introducing Regulatory Compliance Requirements Engineering. ISSE 2006: 439-447 - Michael D. Barwise:
Improving Assurance of Information Security Rol. ISSE 2006: 318-325 - Pius Alexander Benczek:
Implementation of DRM Systems under the EU Legal Framework. ISSE 2006: 72-94 - Gunter Bitz:
Selecting the Optimal Biometric 2-factor Authentication Method - a User's Viewpoint. ISSE 2006: 204-210 - Charles Brookson, Dionisio Zumerle:
Information Security Standardization - the ETSI Perspective. ISSE 2006: 108-118 - Aniello Castiglione
, Giuseppe Cattaneo
, Alfredo De Santis
, Fabio Petagna, Umberto Ferraro Petrillo:
SPEECH: Secure Personal End-to-End Communication with Handheld. ISSE 2006: 287-297 - Feng Cheng, Christoph Meinel:
Lock-Keeper: A New Implementation of Physical Separation Technology. ISSE 2006: 275-286 - Jan De Ciercq:
Deflecting Active Directory Attacks. ISSE 2006: 168-175 - Robert Dulude, David Engberg, Seth Hitchings:
An Introduction to Validation for Federated PKIs. ISSE 2006: 228-240 - Simone Ferraresi, Stefano Pesic, Livia Trazza, Andrea Baiocchi:
S-VPN Policy: Access List Conflict Automatic Analysis and Resolution. ISSE 2006: 266-274 - Kevin Foltz, Coimbatore Chandersekaran:
Centrally Administered COIs Using Cross-Organizational Trust. ISSE 2006: 311-317 - Wim Hafkamp:
IT Security Vulnerability and Incident Response Management. ISSE 2006: 387-395 - Helena Handschuh, Elena Trichina:
Hardware Security Features for Secure Embedded Devices. ISSE 2006: 38-44 - Heather M. Hinton, Mark Vandenwauver:
Identifying Patterns of Federation Adoption. ISSE 2006: 151-160 - Detlef Houdeau:
European Citizen Card Combined with Travel Document Function, Convergence or Divergence? ISSE 2006: 25-29 - Philip Hoyer:
A New Standard Based Road to Interoperable Strong Authentication. ISSE 2006: 139-147 - Angelika Jaschob, Lydia Tsintsifa:
IT-Grundschutz: Two-Tier Risk Assessment for a Higher Efficiency in IT Security Management. ISSE 2006: 95-101 - Irene Kafeza, Eleanna Kafeza
, Felix Wai-Hon Chan:
Legal Issues in Secure Grid Computing Environments. ISSE 2006: 448-454 - Tom Kan, Tim Kerins, Klaus Kursawe:
Security in Next Generation Consumer Electronic Devices. ISSE 2006: 45-53 - Tom A. M. Kevenaar, Geert Jan Schrijen
, Anton H. M. Akkermans, Marijn Damstra, Pim Tuyls, Michiel van der Veen:
Robust and Secure Biometrics: Some Application Examples. ISSE 2006: 196-203 - Pieter Kleve, Richard V. de Mulder, Kees van Noortwijk:
The Impact of Monitoring Technology on the Law. ISSE 2006: 455-466 - Antonio Lioy
:
Security Analysis and Configuration of Large Networks. ISSE 2006: 259-265 - Giovanni Manca:
Electronic signature in Italy after ten years of "running in". ISSE 2006: 363-373 - Milan Markovic, Milos Kilibarda, Aleksandar Milosevic:
PKi Consolidation Project and Multiapplicative Smart Payment Cards. ISSE 2006: 249-258 - Manel Medina, Miquel Colomer, Sandra Garcia Polo, Antoine de Poorter:
Fidelity: Federated Identity Management Security based on Liberty Alliance on European Ambit. ISSE 2006: 161-167 - Andreas Mitrakas:
Information Security Regulation: Tomorrow Never Dies? ISSE 2006: 433-438 - Marco Casassa Mont
:
On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context. ISSE 2006: 405-414 - Anthony J. Nadalin, Nataraj Nagaratnam, Maryann Hondo:
Securing service-oriented applications. ISSE 2006: 336-343