Abstract is missing.
- SAFECode Whitepaper: Fundamental Practices for Secure Software Development 2nd EditionStacy Simpson. 1-32 [doi]
- In-House Standardization of Security Measures: Necessity, Benefits and Realworld ObstructionsEberhard von Faber. 35-48 [doi]
- An Effective Approach for Assessing the Risk of Acquired IT ProductsEric Baize, Steve Lipner. 49-55 [doi]
- IT-Security in Railway Signalling SystemsChristian Schlehuber, Erik Tews, Stefan Katzenbeisser 0001. 56-64 [doi]
- 13+ Real Ways to Destroy Business by Breaking Company's SAP ApplicationsAlexander Polyakov. 65-78 [doi]
- Achieving the eIDAS Vision Through the Mobile, Social and Cloud TriadFrancisco Jordan, Helena Pujol, David Ruana. 81-93 [doi]
- Security Versus Usability - User-Friendly Qualified Signatures Based on German ID CardsGregor Bühler, Enrico Entschew, Marcel Selhorst. 94-105 [doi]
- Using the Semantic Web to Generate Trust IndicatorsMarc Sel. 106-119 [doi]
- Hidden and Uncontrolled - On the Emergence of Network Steganographic ThreatsSteffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier 0001. 123-133 [doi]
- Restricting Excessive State-on-State Cyber Espionage under International Law: A Quest of Futility?Murdoch Watney. 134-143 [doi]
- Securing Cloud: Elastic Key Management and Homomorphic EncryptionAlexander W. Koehler. 144-154 [doi]
- Secure Communication and Digital Sovereignty in EuropeNorbert Pohlmann, Michael Sparenberg, Illya Siromaschenko, Kilian Kilden. 155-169 [doi]
- The need of European White Knights for the TLS/SSL Certificate SystemArno Fiedler, Christoph Thiel. 170-174 [doi]
- Emerging Technologies, Disrupt or be DisruptedSteven Ackx. 177-187 [doi]
- Hardware Intrinsic Security to Protect Value in the Mobile MarketVincent van der Leest, Roel Maes, Geert Jan Schrijen, Pim Tuyls. 188-198 [doi]
- On Cross-Border Mobile Government SystemsMilan Markovic, Goran Dordevic. 199-208 [doi]
- Privacy for Cloud StorageAnders Andersen, Trygve Hardersen, Norbert Schirmer. 211-219 [doi]
- Enforcing Data Privacy in the Age of Google GlassChristian Thiel, Christoph Thiel. 220-229 [doi]
- Internet of Trucks and Digital Tachograph - Security and Privacy ThreatsMarc Sel, Dusko Karaklajic. 230-238 [doi]
- Towards eIDAS as a ServiceDetlef Hühnlein. 241-248 [doi]
- What now? Data Retention Scenarios After the ECJ RulingAlessandro Guarino. 249-255 [doi]
- From Research Results to Strategy: A Mapping ExerciseMichele Bezzi, Frances Cleary, Luca Compagna. 256-264 [doi]