default search action
Information Security Technical Report, Volume 17
Volume 17, Numbers 1-2, February 2012
- Vladimir Jirasek:
Practical application of information security models. 1-8 - Simon Walker:
Economics and the cyber challenge. 9-18 - Guy Bunker:
Technology is not enough: Taking a holistic view for information assurance. 19-25
- Anika Pflug, Daniel Hartung, Christoph Busch:
Feature extraction from vein images using spatial information and chain codes. 26-35 - Patrick Bours:
Continuous keystroke dynamics: A different perspective towards biometric evaluation. 36-43
- Ethel Quayle, Max Taylor:
Corrigendum to "Social networking as a nexus for engagement and exploitation of young people" [Inform Secur Tech Rep 16 (2) (2011) 44-50]. 44
Volume 17, Number 3, February 2013
- Ioannis G. Askoxylakis, Mark Manulis, Joachim Posegga:
Security and privacy for digital ecosystems. 45 - Sherman S. M. Chow, Man Ho Au, Willy Susilo:
Server-aided signatures verification secure against collusion attack. 46-57 - Nikolaos E. Petroulakis, Elias Z. Tragos, Alexandros G. Fragkiadakis, George Spanoudakis:
A lightweight framework for secure life-logging in smart environments. 58-70 - Daniel Schreckling, Johannes Köstler, Matthias Schaff:
Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android. 71-80 - Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier:
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems. 81-92 - Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti:
SmartK: Smart cards in operating systems at kernel level. 93-104 - Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer:
Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications. 105-116 - Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:
Secure computations on non-integer values with applications to privacy-preserving sequence analysis. 117-128
Volume 17, Number 4, May 2013
- Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro:
Semantic analysis of role mining results and shadowed roles detection. 131-147 - Anne Baumgrass, Mark Strembeck:
Bridging the gap between role mining and role engineering via migration guides. 148-172 - Jason L. Wright, Miles McQueen, Lawrence Wellman:
Analyses of two end-user software vulnerability exposure metrics (extended version). 173-184 - Moritz Riesner, Michael Netter, Günther Pernul:
Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments. 185-198 - Daniel Feledi, Stefan Fenz, Lukas Lechner:
Toward web-based information security knowledge sharing. 199-209 - Amir Herzberg, Haya Schulmann:
Oblivious and fair server-aided two-party computation. 210-226 - Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs. 227-238 - Thomas Plos, Christian Maierhofer:
On measuring the parasitic backscatter of sensor-enabled UHF RFID tags. 239-252
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.