Sciweavers

3149 search results - page 87 / 630
» IT security risk management
Sort
View
IDTRUST
2010
ACM
15 years 7 months ago
Biometrics-based identifiers for digital identity management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
72
Voted
IDTRUST
2009
ACM
15 years 7 months ago
Privacy-preserving management of transactions' receipts for mobile environments
Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer ...
ACISP
2003
Springer
15 years 4 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
70
Voted
CRITIS
2008
15 years 2 months ago
A Structured Approach to Incident Response Management in the Oil and Gas Industry
Maria B. Line, Eirik Albrechtsen, Martin Gilje Jaa...
88
Voted
CHI
2008
ACM
16 years 1 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...