researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Sec. Techn. Report
Home
Index
Info
Volume
Volume
15
, Issue
4
137
--
0
André Mariën
.
Matchmaking between PCI-DSS and Security
138
--
144
Georges Ataya
.
PCI DSS audit and compliance
145
--
149
Jeff Tutton
.
Incident response and compliance: A case study of the recent attacks
150
--
153
Gunnar Peterson
.
From auditor-centric to architecture-centric: SDLC for PCI DSS
154
--
159
J. Andrew Valentine
.
Compliance complacency: How 'check-box' compliancy remains a pitfall for many organizations worldwide
160
--
165
Branden R. Williams
.
How tokenization and encryption can enable PCI DSS compliance
Volume
15
, Issue
3
77
--
78
John Austen
.
Computer crime - A 2011 update
79
--
103
Claire Elliott
.
Botnets: To what extent are they a threat to information security?
104
--
111
Kim-Kwang Raymond Choo
.
High tech criminal threats to the national information infrastructure
112
--
133
Kuheli Roy Sarkar
.
Assessing insider threats to information security using technical, behavioural and organisational measures
134
--
136
William Walker
.
Mobile telephony security compromises
Volume
15
, Issue
2
41
--
0
Chez Ciechanowicz
.
Identity Theft and Reconstruction
42
--
46
Steven M. Furnell
.
Online identity: Giving it all away?
47
--
50
Karen Lawrence Öqvist
.
The art of alchemy
51
--
56
Marc Langheinrich
,
Günter Karjoth
.
Social networking and the risk to companies and institutions
57
--
66
Allan Tomlinson
,
Po-Wah Yau
,
John A. MacDonald
.
Privacy threats in a mobile enterprise social network
67
--
71
Andy Jones
,
Thomas Martin
.
Digital forensics and the issues of identity
72
--
75
Karen Lawrence Öqvist
.
Fool's gold
Volume
15
, Issue
1
1
--
0
Chez Ciechanowicz
.
Protocols and cryptography
2
--
7
Chris Sundt
.
Cryptography in the real world
8
--
12
Keith Mayes
,
Carlos Cid
.
The MIFARE Classic story
13
--
20
Dimitrios Patsos
,
Chez Ciechanowicz
,
Fred Piper
.
The status of National PKIs - A European overview
21
--
27
Alexander W. Dent
.
Choosing key sizes for cryptography
28
--
32
George French
,
Mike Bond
.
Caveat venditor
33
--
40
Sriramkrishnan Srinivasan
.
Identity based encryption: Progress and challenges