2011 share record
persistent URL:
Norbert Pohlmann , Helmut Reimer , Wolfgang Schneider : ISSE 2010 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2010 Conference, Berlin, Germany, October 5-7, 2010. Vieweg+Teubner 2011 , ISBN 978-3-8348-1438-8 [contents] 2010 share record
persistent URL:
Santiago Uriel Arias : Taking Signatures Seriously - Combining Biometric and Digital Signatures. ISSE 2010 : 323-333 share record
persistent URL:
Paolo Balboni : Data Protection and Data Security Issues Related to Cloud Computing in the EU. ISSE 2010 : 163-172 share record
persistent URL:
Kristian Beckers , Jan Jürjens : Security and Compliance in Clouds. ISSE 2010 : 91-100 share record
persistent URL:
Ingo Bente , Jörg Vieweg , Josef von Helden : Countering Phishing with TPM-bound Credentials. ISSE 2010 : 236-246 share record
persistent URL:
Werner Braun , Dirk Arendt : AusweisApp and the eID Service/Server - Online Identification Finally more Secure. ISSE 2010 : 374-384 share record
persistent URL:
Christian Brindley : Authentication and Trust: Turning the Cloud inside out. ISSE 2010 : 72-79 share record
persistent URL:
Timothy Casey , Patrick Koeberl , Claire Vishik : Defining Threat Agents: Towards a More Complete Threat Analysis. ISSE 2010 : 214-225 share record
persistent URL:
Ann Cavoukian : Privacy by Design: Best Practices for Privacy and the Smart Grid. ISSE 2010 : 260-270 share record
persistent URL:
Luciana Costa , Roberta D'Amico : Malware Detection and Prevention Platform: Telecom Italia Case Study. ISSE 2010 : 203-213 share record
persistent URL:
Rosalia D'Alessandro , Manuel Leone : A Mechanism for e-Banking Frauds Prevention and User Privacy Protection. ISSE 2010 : 226-235 share record
persistent URL:
Jan Eichholz , Detlef Hühnlein , Gisela Meister , Johannes Schmölz : New Authentication Concepts for Electronic Identity Tokens. ISSE 2010 : 26-38 share record
persistent URL:
Eberhard von Faber , Michael Pauly : User Risk Management Strategies and Models - Adaption for Cloud Computing. ISSE 2010 : 80-90 share record
persistent URL:
Sebastian Feld , Norbert Pohlmann : Security Analysis of OpenID, followed by a Reference Implementation of an nPA-based OpenID Provider. ISSE 2010 : 13-25 share record
persistent URL:
Lenka Fibíková , Roland Müller : A Simplified Approach for Classifying Applications. ISSE 2010 : 39-49 share record
persistent URL:
Ulrich Flegel : Privacy Compliant Internal Fraud Screening. ISSE 2010 : 191-199 share record
persistent URL:
Ulrich Hamann : Germany on the Road to Electronic Proof of Identity. ISSE 2010 : 1-9 share record
persistent URL:
Bernhard M. Hämmerli , Henning H. Arendt : Critical Infrastructure in Finance PARSIFAL Recommendations. ISSE 2010 : 115-121 share record
persistent URL:
Marit Hansen : Towards Future-Proof Privacy-Respecting Identity Management Systems. ISSE 2010 : 182-190 share record
persistent URL:
Sibylle Hick , Fares Rahmun , Ernest Hammerschmidt : Visa Applications in TG Biometrics for Public Sector Applications. ISSE 2010 : 315-322 share record
persistent URL:
Scott Howard : SCADA and Control System Security: New Standards Protecting Old Technology. ISSE 2010 : 343-353 share record
persistent URL:
Philip Hoyer : DSKPP and PSKC, IETF Standard Protocol and Payload for Symmetric Key Provisioning. ISSE 2010 : 291-299 share record
persistent URL:
Marek Jawurek , Martin Johns : Security Challenges of a Changing Energy Landscape. ISSE 2010 : 249-259 share record
persistent URL:
Patrick Koeberl , Jiangtao Li , Anand Rajan , Claire Vishik : Silicon PUFs in Practice. ISSE 2010 : 300-311 share record
persistent URL:
Miroslaw Kutylowski , Przemyslaw Kubiak : Polish Concepts for Securing E-Government Document Flow. ISSE 2010 : 399-407 share record
persistent URL:
Ulrich Lang : Cloud & SOA Application Security as a Service. ISSE 2010 : 61-71 share record
persistent URL:
Marcus Lasance : Single Sign-on(SSO) to Cloud based Services and Legacy Applications "Hitting the IAM wall". ISSE 2010 : 53-60 share record
persistent URL:
Herbert Leitold , Bernd Zwattendorfer : STORK: Architecture, Implementation and Pilots. ISSE 2010 : 131-142 share record
persistent URL:
Matthias Luft , Thorsten Holz : A Small Leak will Sink a Great Ship: An Empirical Study of DLP Solutions. ISSE 2010 : 354-364 share record
persistent URL:
Marian Margraf : The New German ID Card. ISSE 2010 : 367-373