Sign in
International Information Security Workshops
2004
2004
2004
Keyphrases
Publications
2004
Natalia Miloslavskaia
,
Alexander Tolstoi
,
Dmitriy Ushakov
Laboratory Support for Information Security Education.
International Information Security Workshops
(2004)
Alex Cameron
Infusing Privacy Norms in DRM - Incentives and Perspectives from Law.
International Information Security Workshops
(2004)
Nimal Jayaratna
A New Paradigm for Information Security Education at Doctoral Level.
International Information Security Workshops
(2004)
Jill Slay
Doctor of Philosophy: IT Security.
International Information Security Workshops
(2004)
Sokratis K. Katsikas
Doctoral Programme on Information and Communication Systems Security at the University of the Aegean.
International Information Security Workshops
(2004)
T. B. Busuttil
,
Matthew J. Warren
CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure Protection.
International Information Security Workshops
(2004)
Kerry-Lynn Thomson
,
Rossouw von Solms
Towards Corporate Information Security Obedience.
International Information Security Workshops
(2004)
Claudia Díaz
,
Bart Preneel
Taxonomy of Mixes and Dummy Traffic.
International Information Security Workshops
(2004)
Alexander Iliev
,
Sean W. Smith
Private Information Storage with Logarithm-Space Secure Hardware.
International Information Security Workshops
(2004)
Els Van Herreweghen
A Risk Driven Approach to Designing Privacy Enhanced Secure.
International Information Security Workshops
(2004)
Andreas Jacobsson
,
Martin Boldt
,
Bengt Carlsson
Privacy Invasive Software in File-Sharing Tools.
International Information Security Workshops
(2004)
Marco Voss
Privacy Preserving Online Reputation Systems.
International Information Security Workshops
(2004)
Cynthia E. Irvine
,
Timothy E. Levin
A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach.
International Information Security Workshops
(2004)
Aung Htike Phyo
,
Steven Furnell
,
Francisco Portilla
A Framework For Role-based Monitoring of Insider Misuse.
International Information Security Workshops
(2004)
Kevin O'Sullivan
,
Karen Neville
,
Ciara Heavin
Investigating a Smart Technology.
International Information Security Workshops
(2004)
Louise Yngström
An Holistic Approach to an International Doctoral Program in Information Security.
International Information Security Workshops
(2004)
Tobias Baier
,
Christian P. Kunze
Identity Management for Self-Portrayal.
International Information Security Workshops
(2004)
Andreas Pashalidis
,
Chris J. Mitchell
A Security Model for Anonymous Credential Systems.
International Information Security Workshops
(2004)
V. Gorbatov
,
A. Maluk
,
Natalia Miloslavskaia
,
Alexander Tolstoi
Highly Qualified Information Security Personnel Training in Russia.
International Information Security Workshops
(2004)
Gerald Quirchmayr
An International Security Perspective.
International Information Security Workshops
(2004)
Andrew M. Colarik
,
Clark D. Thomborson
,
Lech J. Janczewski
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications.
International Information Security Workshops
(2004)
Ronald Dodge
Do Military Forces Need Ph.D.s?
International Information Security Workshops
(2004)
Johan Van Niekerk
,
Rossouw von Solms
Corporate Information Security Education: Is Outcomes Based Education the Solution?
International Information Security Workshops
(2004)
volume 148, 2004
Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France
International Information Security Workshops
148 (2004)