{"title":"Identification and Confidentiality for e-Government","authors":"R. Posch, H. Leitold","doi":"10.1007/978-0-387-35696-9_17","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_17","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users","authors":"O. Mazhelis, A. Seleznyov, S. Puuronen","doi":"10.1007/978-0-387-35696-9_9","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_9","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encrypted Database Integrity in Database Service Provider Model","authors":"Hakan Hacıgümüş, B. Iyer, S. Mehrotra","doi":"10.1007/978-0-387-35696-9_10","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_10","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128660127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Context-Aware Approach to Infer Trust in Public Key Infrastructures","authors":"Fabio Di Vito, P. Inverardi, G. Melideo","doi":"10.1007/978-0-387-35696-9_6","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_6","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122465883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Status of Privacy Enhancing Technologies","authors":"J. Borking","doi":"10.1007/978-0-387-35696-9_15","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_15","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131196887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Applications with a Single Smart Card","authors":"D. Shaw, S. Maj","doi":"10.1007/978-0-387-35696-9_13","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_13","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mountain Information System: A Distributed E-Government Office","authors":"G. Marinelli, P. Russo","doi":"10.1007/978-0-387-35696-9_7","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_7","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"10 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129136773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Initiatives in the Fight Against Cyber Terrorism","authors":"K. Tolan","doi":"10.1007/978-0-387-35696-9_16","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_16","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Respecting Privacy in E-Government","authors":"J. Stoddart","doi":"10.1007/978-0-387-35696-9_14","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_14","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129531537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Considerations in Web Security","authors":"A. Iyengar, R. Mraz, M. Zurko","doi":"10.1007/978-0-387-35696-9_4","DOIUrl":"https://doi.org/10.1007/978-0-387-35696-9_4","url":null,"abstract":"","PeriodicalId":276612,"journal":{"name":"Certification and Security in E-Services","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}