Graphical passwords
|
2012 |
Catuogno, Luigi |
A decision support system for privacy compliance
|
2012 |
Pearson, Siani |
A privacy service for comparison of privacy and trust policies within SOA
|
2012 |
Allison, David S. |
Creating and applying security goal indicator trees in an industrial environment
|
2012 |
|
Privacy-aware organisation-based access control model (PrivOrBAC)
|
2012 |
Ajam, Nabil |
Embedded system security risk in a green-house environment
|
2012 |
Oraon, Trailokya |
Grid of security : a decentralized enforcement of the network security
|
2012 |
|
A dynamic cyber security economic model : incorporating value functions for all involved parties
|
2012 |
Axelrod, C. Warren |
A pragmatic approach to intrusion response metrics
|
2012 |
Strasburg, Chris |
Assessing the security of software configurations
|
2012 |
Neto, Afonso Araújo |
Information security management based on linguistic sharing techniques
|
2012 |
Ogiela, Marek R. |
SQL injection attacks countermeasures
|
2012 |
Amiratahmasebi, Kasra |
Security and authentication issues of an embedded system designed and implemented for interactive Internet users
|
2012 |
Baruah, Siddhartha |
A distributed and secure architecture for signature and decryption delegation through remote smart cards
|
2012 |
Cattaneo, Giuseppe |
Information security management : awareness of threats in e-commerce
|
2012 |
Rahman, Mohammad Mahfuzur |
Analyzing information security goals
|
2012 |
Kolkowska, Ella |
Towards a framework for collaborative enterprise security
|
2012 |
Misra, Janardan |
Can formal methods really help : analyzing the security of electronic voting systems
|
2012 |
Weldemariam, Komminist |
Countering spam robots : scrambled CAPTCHA and Hindi CAPTCHA
|
2012 |
Raj, Aditya |
Security in wireless sensor networks with mobile codes
|
2012 |
|