Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3149
search results - page 87 / 630
»
IT security risk management
Sort
relevance
views
votes
recent
update
View
thumb
title
26
click to vote
IDTRUST
2010
ACM
168
views
Security Privacy
»
more
IDTRUST 2010
»
Biometrics-based identifiers for digital identity management
14 years 3 months ago
Download
middleware.internet2.edu
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
claim paper
Read More »
16
click to vote
IDTRUST
2009
ACM
81
views
Security Privacy
»
more
IDTRUST 2009
»
Privacy-preserving management of transactions' receipts for mobile environments
14 years 3 months ago
Download
middleware.internet2.edu
Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer ...
claim paper
Read More »
25
click to vote
ACISP
2003
Springer
89
views
Security Privacy
»
more
ACISP 2003
»
Separating Encryption and Key Issuance in Digital Rights Management Systems
14 years 21 days ago
Download
imailab-www.iis.u-tokyo.ac.jp
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
claim paper
Read More »
20
click to vote
CRITIS
2008
79
views
Security Privacy
»
more
CRITIS 2008
»
A Structured Approach to Incident Response Management in the Oil and Gas Industry
13 years 10 months ago
Download
critis08.dia.uniroma3.it
Maria B. Line, Eirik Albrechtsen, Martin Gilje Jaa...
claim paper
Read More »
28
click to vote
CHI
2008
ACM
120
views
Human Computer Interaction
»
more
CHI 2008
»
Security practitioners in context: their activities and interactions
14 years 9 months ago
Download
lersse-dl.ece.ubc.ca
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...
claim paper
Read More »
« Prev
« First
page 87 / 630
Last »
Next »