researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
13
, Issue
4
193
--
194
Lizzie Coles-Kemp
.
Introduction
195
--
201
Debi Ashenden
.
Information Security management: A human challenge?
202
--
206
Iain Crinson
.
Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique
207
--
215
Patricia A. H. Williams
.
In a 'trusting' environment, everyone is responsible for information security
216
--
219
Richard E. Overill
.
ISMS insider intrusion prevention and detection
220
--
224
Andy Jones
.
Catching the malicious insider
225
--
234
Terrence Walker
.
Practical management of malicious insider threat - An enterprise CSIRT perspective
235
--
246
Christian W. Probst
,
René Rydhof Hansen
.
An extensible analysable system model
247
--
255
Edward Humphreys
.
Information security management standards: Compliance, governance and risk management
Volume
13
, Issue
3
111
--
0
Allan Tomlinson
.
Developments in mobile communications security
112
--
117
André van Cleeff
.
Future consumer mobile phone security: A case study using the data-centric security model
118
--
126
Adrian Leung
.
A mobile device management framework for secure service delivery
127
--
135
John A. MacDonald
.
Authentication & key agreement for off-portal mobile applications
136
--
150
Rene Mayrhofer
,
Hans Gellersen
.
Spontaneous mobile device authentication based on sensor data
151
--
157
Nai-Wei Lo
,
Kuo-Hui Yeh
,
Chan Yeob Yeun
.
New mutual agreement protocol to secure mobile RFID-enabled devices
158
--
164
Chan Yeob Yeun
,
Kyusuk Han
,
Duc-Liem Vo
,
Kwangjo Kim
.
Secure authenticated group key agreement protocol in the MANET environment
165
--
172
Christoph Krauß
,
Markus Schneider 0002
,
Claudia Eckert
.
On handling insider attacks in wireless sensor networks
173
--
192
Keith Mayes
,
Konstantinos Markantonakis
.
Mobile communication security controllers an evaluation paper
Volume
13
, Issue
2
45
--
0
Michael J. Ganley
.
Introduction to this issue
46
--
53
Siddhartha Arora
.
National e-ID card schemes: A European overview
54
--
60
Danny De Cock
,
Koen Simoens
,
Bart Preneel
.
Insights on identity documents based on the Belgian case study
61
--
70
Tony Collings
.
Some thoughts on the underlying logic and process underpinning Electronic Identity (e-ID)
71
--
75
Paul De Hert
.
Identity management of e-ID, privacy and security in Europe. A human rights view
76
--
82
Thomas Myhr
.
Legal and organizational challenges and solutions for achieving a pan-European electronic ID solution: or I am 621216-1318, but I am also 161262-43774. Do you know who I am?
83
--
94
Marit Hansen
,
Andreas Pfitzmann
,
Sandra Steinbrecher
.
Identity management throughout one's whole life
95
--
103
Geraint Price
.
The benefits and drawbacks of using electronic identities
105
--
110
John Steer
,
Ashish Popli
.
Building secure business applications at Microsoft
Volume
13
, Issue
1
1
--
9
Dieter Gollmann
.
Securing Web applications
10
--
16
Francesca Saglietti
,
Norbert Oster
,
Florin Pinte
.
White and grey-box verification and validation approaches for safety- and security-critical software systems
17
--
24
John McDermott
,
James Kirby
,
Bruce E. Montrose
,
Travis Johnson
,
Myong H. Kang
.
Re-engineering Xen internals for higher-assurance security
25
--
32
Lieven Desmet
,
Wouter Joosen
,
Fabio Massacci
,
Pieter Philippaerts
,
Frank Piessens
,
Ida Siahaan
,
Dries Vanoverberghe
.
Security-by-contract on the .NET platform
33
--
39
Brian Chess
,
Jacob West
.
Dynamic taint propagation: Finding vulnerabilities without attacking
40
--
43
Mason Brown
,
Alan Paller
.
Secure software development: Why the development world awoke to the challenge