//--> //--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
type_genre:"Mehrbändiges Werk"
~isPartOf:"E-business and telecommunications : 4th international conference ; revised selected papers"
~type_genre:"Book section"
~type_genre:"Handbuch"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Datensicherheit"
Narrow search
Delete all filters
| 4 applied filters
Year of publication
From:
To:
Subject
All
Data security
12
Datensicherheit
12
Theorie
12
Theory
12
User access control
10
Zutrittskontrolle
10
IT crime
6
IT-Kriminalität
6
Computer network
3
Computernetz
3
Algorithm
2
Algorithmus
2
Computerized method
2
Computerunterstützung
2
Database
2
Datenbank
2
Mobile Anwendung
2
Mobile application
2
Artificial intelligence
1
Betriebliches Informationssystem
1
Betrug
1
Biometrics
1
Biometrie
1
Business intelligence system
1
E-Government
1
E-commerce
1
E-government
1
E-procurement
1
Electronic Commerce
1
Electronic data interchange
1
Elektronische Beschaffung
1
Elektronischer Datenaustausch
1
Enterprise architecture
1
Fraud
1
Inter-firm cooperation
1
Internet
1
Knowledge transfer
1
Künstliche Intelligenz
1
Local Area Network
1
Local area network
1
more ...
less ...
Type of publication
All
Article
12
Type of publication (narrower categories)
All
Mehrbändiges Werk
Book section
Handbuch
Aufsatz im Buch
12
Case study
1
Fallstudie
1
Language
All
English
12
Author
All
Alexopoulos, Panos
1
Athanassiadis, Nicholas
1
Baldimtsi, F.
1
Bar-Josef, Noa
1
Benetou, Xanthi
1
Božović, Vladimir
1
Böttcher, Stefan
1
Cennamo, Paolo
1
Chalkias, K.
1
Chandra, Satish
1
Debbabi, Mourad
1
Ferrante, Alberto
1
Fresa, Antonio
1
Hristu-Varsakelis, D.
1
Kafentzis, Kostas
1
Kiyomoto, Shinsaku
1
Koblensky, Mingyur
1
Laverdière, Marc-André
1
Li, Jing
1
Longo, Maurizio
1
Loreti, Michele
1
Manganaro, Andrea
1
Mourad, Azzam
1
Obermeier, Sebastian
1
Omote, Kazumasa
1
Piuri, Vincenzo
1
Postiglione, Fabio
1
Robustelli, Anton Luca
1
Sakurai, Kouichi
1
Sampalli, Srinivas
1
Shimoyama, Takeshi
1
Socek, Daniel
1
Stephanides, G.
1
Tagaris, Tassos
1
Tanaka, Toshiaki
1
Tao, Kai
1
Torii, Satoru
1
Wool, Avishai
1
Ćulibrk, Dubravko
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
The secure online business handbook : a practical guide to risk management and business continuity
19
Threats, countermeasures, and advances in applied information security
13
Online banking security measures and data protection
11
Information assurance and security technologies for risk assessment and threat management : advances
10
The Emerald handbook of blockchain for business
10
Cryptocurrencies and blockchain technology applications
8
The economics of information security and privacy : [this volume contains a selection of 13 revised contributions to the 11th WEIS, which took place in Berlin, Germany, on 25 - 26 June 2012.]
8
Managing information risk and the economics of security
6
Strengthening industrial cybersecurity to protect business intelligence
6
The evolution of business in the cyber age : digital transformation, threats, and security
6
Contemporary studies of risks in emerging technology
5
Digital identity management : perspectives on the technological, business and social implications
5
E-Business and telecommunications : 6th international joint conference, ICETE 2009, Milan, Italy, July 7 - 10, 2009 ; revised selected papers
5
Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems
5
Mobile electronic commerce : foundations, development, and applications
5
Trust management : 4th international conference, iTrust 2006, Pisa, Italy, May 16 - 19, 2006 ; proceedings
5
Blockchain and distributed ledger technology use cases : applications and lessons learned
4
Digital transformation, strategic resilience, cyber security and risk management
4
E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings
4
Managing business risk : a practical guide to protecting your business
4
Operational risk perspectives : cyber, big data, and emerging risks
4
Organizational, legal, and technological dimensions of information system administration
4
Politik und Wirtschaft
4
Psychological and behavioral examinations in cyber security
4
The Second International Conference on Mobile Business : m>Business 2003 ; [Die Konferenz "m>Business" fand vom 23. bis 24. Juni 2003 in Wien statt]
4
Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten
4
Approaches and processes for managing the economics of information systems
3
Business information systems : 12th international conference, BIS 2009, Poznań, Poland, April 27-29, 2009 ; proceedings
3
CISO leadership : essential principles for success
3
E-Life: web-enabled convergence of commerce, work, and social life : 10th Workshop on E-Business, WEB 2011 ; Shanghai, China, December 2011 ; revised selected papers
3
E-commerce agents : marketplace solutions, security issues, and supply and demand
3
Handbook of research in mobile business : technical, methodological, and social perspectives
3
IDIMT-2008: Managing the Unmanageable : 16th Interdisciplinary Information Management Talks ; September 10 - 12, 2008, Jindřich°uv Hradec, Czech Republik
3
IT-Outsourcing in der Praxis : Strategien, Projektmanagement, Wirtschaftlichkeit
3
IT-Sicherheit im Gesundheitswesen : Beiträge zum 10. CCEC-Workshop ; vom 25. Juni 2008 ; [multimediale Dokumentation]
3
Information resources management ; Vol. 4
3
Information technology, new dimensions of government and citizen interaction, and human security in Mainland China, and the Taiwan experience : [international colloquium proceedings, October 19th, 2001]
3
Informationelles Vertrauen für die Informationsgesellschaft
3
Innovations in SMEs and conducting e-business : technologies, trends and solutions
3
more ...
less ...
Source
All
ECONIS (ZBW)
12
Showing
1
-
10
of
12
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
An adaptive knowledge-based approach for detecting fraud across different e-government domains
Alexopoulos, Panos
;
Kafentzis, Kostas
;
Athanassiadis, …
- In:
E-business and telecommunications : 4th international …
,
(pp. 110-121)
.
2008
Persistent link: https://www.econbiz.de/10003802911
Saved in:
2
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa
;
Shimoyama, Takeshi
;
Torii, Satoru
- In:
E-business and telecommunications : 4th international …
,
(pp. 125-138)
.
2008
Persistent link: https://www.econbiz.de/10003803785
Saved in:
3
Securing biometric templates where similarity is measured with set intersection
Socek, Daniel
;
Božović, Vladimir
;
Ćulibrk, Dubravko
- In:
E-business and telecommunications : 4th international …
,
(pp. 139-151)
.
2008
Persistent link: https://www.econbiz.de/10003803793
Saved in:
4
Remote algorithmic complexity attacks against randomized hash tables
Bar-Josef, Noa
;
Wool, Avishai
- In:
E-business and telecommunications : 4th international …
,
(pp. 162-174)
.
2008
Persistent link: https://www.econbiz.de/10003803877
Saved in:
5
Securing real-time sessions in an IMS-based architecture
Cennamo, Paolo
;
Fresa, Antonio
;
Longo, Maurizio
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 175-187)
.
2008
Persistent link: https://www.econbiz.de/10003803880
Saved in:
6
IPSec database query acceleration
Ferrante, Alberto
;
Chandra, Satish
;
Piuri, Vincenzo
- In:
E-business and telecommunications : 4th international …
,
(pp. 188-200)
.
2008
Persistent link: https://www.econbiz.de/10003803886
Saved in:
7
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai
;
Li, Jing
;
Sampalli, Srinivas
- In:
E-business and telecommunications : 4th international …
,
(pp. 201-213)
.
2008
Persistent link: https://www.econbiz.de/10003803905
Saved in:
8
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
9
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
10
Reliable intersection computation within malicious environments
Böttcher, Stefan
;
Obermeier, Sebastian
- In:
E-business and telecommunications : 4th international …
,
(pp. 239-253)
.
2008
Persistent link: https://www.econbiz.de/10003803927
Saved in:
1
2
Next
Last
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->