//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~isPartOf:"Managing information risk and the economics of security"
~isPartOf:"E-business and telecommunications : 4th international conference ; revised selected papers"
~type_genre:"Aufsatz im Buch"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Verschlüsselung von Daten"
Narrow search
Delete all filters
| 3 applied filters
Year of publication
From:
To:
Subject
All
Data security
18
Datensicherheit
18
Theorie
12
Theory
12
User access control
10
Zutrittskontrolle
10
IT crime
8
IT-Kriminalität
8
Computer network
3
Computernetz
3
Algorithm
2
Algorithmus
2
Betriebliches Informationssystem
2
Business intelligence system
2
Computerized method
2
Computerunterstützung
2
Corporate security
2
Database
2
Datenbank
2
Internet
2
Mobile Anwendung
2
Mobile application
2
Unternehmenssicherheit
2
Artificial intelligence
1
Betrug
1
Biometrics
1
Biometrie
1
Communication
1
Data protection
1
Datenschutz
1
E-Government
1
E-commerce
1
E-government
1
E-procurement
1
EU policies
1
EU-Politik
1
Electronic Commerce
1
Electronic data interchange
1
Elektronische Beschaffung
1
Elektronischer Datenaustausch
1
more ...
less ...
Type of publication
All
Article
18
Type of publication (narrower categories)
All
Aufsatz im Buch
Book section
18
Case study
1
Fallstudie
1
Language
All
English
18
Author
All
Johnson, M. Eric
2
Alexopoulos, Panos
1
Anderson, Ross
1
Athanassiadis, Nicholas
1
Baldimtsi, F.
1
Bar-Josef, Noa
1
Benetou, Xanthi
1
Božović, Vladimir
1
Böhme, Rainer
1
Böttcher, Stefan
1
Cennamo, Paolo
1
Chalkias, K.
1
Chandra, Satish
1
Clayton, Richard
1
Day, Oliver
1
Debbabi, Mourad
1
Ferrante, Alberto
1
Fresa, Antonio
1
Gabriel, Roland
1
Greenstadt, Rachel
1
Hristu-Varsakelis, D.
1
Kafentzis, Kostas
1
Kiyomoto, Shinsaku
1
Koblensky, Mingyur
1
Laverdière, Marc-André
1
Li, Jing
1
Longo, Maurizio
1
Loreti, Michele
1
Manganaro, Andrea
1
Matsuura, Kanta
1
Moore, Tyler
1
Mourad, Azzam
1
Obermeier, Sebastian
1
Omote, Kazumasa
1
Palmen, Brandon
1
Piuri, Vincenzo
1
Postiglione, Fabio
1
Robustelli, Anton Luca
1
Sakurai, Kouichi
1
Sampalli, Srinivas
1
more ...
less ...
Published in...
All
Managing information risk and the economics of security
E-business and telecommunications : 4th international conference ; revised selected papers
The secure online business handbook : a practical guide to risk management and business continuity
19
Threats, countermeasures, and advances in applied information security
13
Online banking security measures and data protection
11
Information assurance and security technologies for risk assessment and threat management : advances
10
The Emerald handbook of blockchain for business
10
Cryptocurrencies and blockchain technology applications
8
The economics of information security and privacy : [this volume contains a selection of 13 revised contributions to the 11th WEIS, which took place in Berlin, Germany, on 25 - 26 June 2012.]
8
The evolution of business in the cyber age : digital transformation, threats, and security
6
Contemporary studies of risks in emerging technology
5
Digital identity management : perspectives on the technological, business and social implications
5
E-Business and telecommunications : 6th international joint conference, ICETE 2009, Milan, Italy, July 7 - 10, 2009 ; revised selected papers
5
Information systems : crossroads for organization, management, accounting and engineering : ItAIS: the Italian Association for Information Systems
5
Mobile electronic commerce : foundations, development, and applications
5
Trust management : 4th international conference, iTrust 2006, Pisa, Italy, May 16 - 19, 2006 ; proceedings
5
Blockchain and distributed ledger technology use cases : applications and lessons learned
4
Digital transformation, strategic resilience, cyber security and risk management
4
E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings
4
Managing business risk : a practical guide to protecting your business
4
Operational risk perspectives : cyber, big data, and emerging risks
4
Organizational, legal, and technological dimensions of information system administration
4
Politik und Wirtschaft
4
Psychological and behavioral examinations in cyber security
4
Strengthening industrial cybersecurity to protect business intelligence
4
The Second International Conference on Mobile Business : m>Business 2003 ; [Die Konferenz "m>Business" fand vom 23. bis 24. Juni 2003 in Wien statt]
4
Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten
4
Approaches and processes for managing the economics of information systems
3
Business information systems : 12th international conference, BIS 2009, Poznań, Poland, April 27-29, 2009 ; proceedings
3
CISO leadership : essential principles for success
3
E-Life: web-enabled convergence of commerce, work, and social life : 10th Workshop on E-Business, WEB 2011 ; Shanghai, China, December 2011 ; revised selected papers
3
E-commerce agents : marketplace solutions, security issues, and supply and demand
3
Handbook of research in mobile business : technical, methodological, and social perspectives
3
IDIMT-2008: Managing the Unmanageable : 16th Interdisciplinary Information Management Talks ; September 10 - 12, 2008, Jindřich°uv Hradec, Czech Republik
3
IT-Outsourcing in der Praxis : Strategien, Projektmanagement, Wirtschaftlichkeit
3
IT-Sicherheit im Gesundheitswesen : Beiträge zum 10. CCEC-Workshop ; vom 25. Juni 2008 ; [multimediale Dokumentation]
3
Information resources management ; Vol. 4
3
Information technology, new dimensions of government and citizen interaction, and human security in Mainland China, and the Taiwan experience : [international colloquium proceedings, October 19th, 2001]
3
Informationelles Vertrauen für die Informationsgesellschaft
3
Innovations in SMEs and conducting e-business : technologies, trends and solutions
3
more ...
less ...
Source
All
ECONIS (ZBW)
18
Showing
1
-
18
of
18
Sort
Relevance
Date (newest first)
Date (oldest first)
1
Managing information risk and the economics of security
Johnson, M. Eric
- In:
Managing information risk and the economics of security
,
(pp. 1-16)
.
2009
Persistent link: https://www.econbiz.de/10003815631
Saved in:
2
Security economics and European policy
Anderson, Ross
;
Böhme, Rainer
;
Clayton, Richard
; …
- In:
Managing information risk and the economics of security
,
(pp. 55-80)
.
2009
Persistent link: https://www.econbiz.de/10003815636
Saved in:
3
BORIS - business ORiented management of information security
Sowa, Sebastian
;
Tsinas, Lampros
;
Gabriel, Roland
- In:
Managing information risk and the economics of security
,
(pp. 81-97)
.
2009
Persistent link: https://www.econbiz.de/10003815638
Saved in:
4
Productivity space of information security in an extension of the Gordon-Loeb's investment model
Matsuura, Kanta
- In:
Managing information risk and the economics of security
,
(pp. 99-119)
.
2009
Persistent link: https://www.econbiz.de/10003815853
Saved in:
5
The value of escalation and incentives in managing information access
Zhao, Xia
;
Johnson, M. Eric
- In:
Managing information risk and the economics of security
,
(pp. 165-177)
.
2009
Persistent link: https://www.econbiz.de/10003815862
Saved in:
6
Reinterpreting the disclosure debate for web infections
Day, Oliver
;
Palmen, Brandon
;
Greenstadt, Rachel
- In:
Managing information risk and the economics of security
,
(pp. 179-197)
.
2009
Persistent link: https://www.econbiz.de/10003815863
Saved in:
7
An adaptive knowledge-based approach for detecting fraud across different e-government domains
Alexopoulos, Panos
;
Kafentzis, Kostas
;
Athanassiadis, …
- In:
E-business and telecommunications : 4th international …
,
(pp. 110-121)
.
2008
Persistent link: https://www.econbiz.de/10003802911
Saved in:
8
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa
;
Shimoyama, Takeshi
;
Torii, Satoru
- In:
E-business and telecommunications : 4th international …
,
(pp. 125-138)
.
2008
Persistent link: https://www.econbiz.de/10003803785
Saved in:
9
Securing biometric templates where similarity is measured with set intersection
Socek, Daniel
;
Božović, Vladimir
;
Ćulibrk, Dubravko
- In:
E-business and telecommunications : 4th international …
,
(pp. 139-151)
.
2008
Persistent link: https://www.econbiz.de/10003803793
Saved in:
10
Remote algorithmic complexity attacks against randomized hash tables
Bar-Josef, Noa
;
Wool, Avishai
- In:
E-business and telecommunications : 4th international …
,
(pp. 162-174)
.
2008
Persistent link: https://www.econbiz.de/10003803877
Saved in:
11
Securing real-time sessions in an IMS-based architecture
Cennamo, Paolo
;
Fresa, Antonio
;
Longo, Maurizio
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 175-187)
.
2008
Persistent link: https://www.econbiz.de/10003803880
Saved in:
12
IPSec database query acceleration
Ferrante, Alberto
;
Chandra, Satish
;
Piuri, Vincenzo
- In:
E-business and telecommunications : 4th international …
,
(pp. 188-200)
.
2008
Persistent link: https://www.econbiz.de/10003803886
Saved in:
13
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai
;
Li, Jing
;
Sampalli, Srinivas
- In:
E-business and telecommunications : 4th international …
,
(pp. 201-213)
.
2008
Persistent link: https://www.econbiz.de/10003803905
Saved in:
14
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
15
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
16
Reliable intersection computation within malicious environments
Böttcher, Stefan
;
Obermeier, Sebastian
- In:
E-business and telecommunications : 4th international …
,
(pp. 239-253)
.
2008
Persistent link: https://www.econbiz.de/10003803927
Saved in:
17
A security hardening language based on aspect-orientation
Mourad, Azzam
;
Laverdière, Marc-André
;
Debbabi, Mourad
- In:
E-business and telecommunications : 4th international …
,
(pp. 254-266)
.
2008
Persistent link: https://www.econbiz.de/10003803946
Saved in:
18
Design of a password-based EAP method
Manganaro, Andrea
;
Koblensky, Mingyur
;
Loreti, Michele
- In:
E-business and telecommunications : 4th international …
,
(pp. 343-355)
.
2008
Persistent link: https://www.econbiz.de/10003804268
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->