International Information Security Workshops最新文献

筛选
英文 中文
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications 更新/补丁管理系统:具有安全含义的协议分类法
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_5
A. Colarik, C. Thomborson, L. Janczewski
{"title":"Update/Patch Management Systems: A Protocol Taxonomy with Security Implications","authors":"A. Colarik, C. Thomborson, L. Janczewski","doi":"10.1007/1-4020-8145-6_5","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_5","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Laboratory Support for Information Security Education 信息安全教育的实验室支持
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_7
N. Miloslavskaia, A. Tolstoĭ, D. Ushakov
{"title":"Laboratory Support for Information Security Education","authors":"N. Miloslavskaia, A. Tolstoĭ, D. Ushakov","doi":"10.1007/1-4020-8145-6_7","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_7","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115674327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Private Information Storage with Logarithm-Space Secure Hardware 基于对数空间安全硬件的私有信息存储
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_17
A. Iliev, Sean W. Smith
{"title":"Private Information Storage with Logarithm-Space Secure Hardware","authors":"A. Iliev, Sean W. Smith","doi":"10.1007/1-4020-8145-6_17","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_17","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130921367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Taxonomy of Mixes and Dummy Traffic 混合和虚拟流量的分类
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_18
Claudia Díaz, B. Preneel
{"title":"Taxonomy of Mixes and Dummy Traffic","authors":"Claudia Díaz, B. Preneel","doi":"10.1007/1-4020-8145-6_18","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_18","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
A Framework For Role-based Monitoring of Insider Misuse 基于角色的内部滥用监控框架
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_4
A. H. Phyo, S. Furnell, Francisco Portilla
{"title":"A Framework For Role-based Monitoring of Insider Misuse","authors":"A. H. Phyo, S. Furnell, Francisco Portilla","doi":"10.1007/1-4020-8145-6_4","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_4","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating a Smart Technology 研究一项智能技术
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_6
K. O'Sullivan, K. Neville, C. Heavin
{"title":"Investigating a Smart Technology","authors":"K. O'Sullivan, K. Neville, C. Heavin","doi":"10.1007/1-4020-8145-6_6","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_6","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130226103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Corporate Information Security Obedience 企业信息安全服从
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_2
K. Thomson, R. V. Solms
{"title":"Towards Corporate Information Security Obedience","authors":"K. Thomson, R. V. Solms","doi":"10.1007/1-4020-8145-6_2","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_2","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Infusing Privacy Norms in DRM - Incentives and Perspectives from Law 在DRM中注入隐私规范——激励机制与法律视角
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_23
A. Cameron
{"title":"Infusing Privacy Norms in DRM - Incentives and Perspectives from Law","authors":"A. Cameron","doi":"10.1007/1-4020-8145-6_23","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_23","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122875280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Invasive Software in File-Sharing Tools 文件共享工具中的侵犯隐私软件
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_22
A. Jacobsson, Martin Boldt, B. Carlsson
{"title":"Privacy Invasive Software in File-Sharing Tools","authors":"A. Jacobsson, Martin Boldt, B. Carlsson","doi":"10.1007/1-4020-8145-6_22","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_22","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"2 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129764000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Do Military Forces Need Ph.D.s? 军队需要博士学位吗?
International Information Security Workshops Pub Date : 1900-01-01 DOI: 10.1007/1-4020-8145-6_14
R. Dodge
{"title":"Do Military Forces Need Ph.D.s?","authors":"R. Dodge","doi":"10.1007/1-4020-8145-6_14","DOIUrl":"https://doi.org/10.1007/1-4020-8145-6_14","url":null,"abstract":"","PeriodicalId":376287,"journal":{"name":"International Information Security Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信