Verläßliche IT-Systeme最新文献

筛选
英文 中文
Ein nachweisbares Authentikationsprotokoll am Beispiel von UMTS 建方尖级
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_25
Stefanie Pütz
{"title":"Ein nachweisbares Authentikationsprotokoll am Beispiel von UMTS","authors":"Stefanie Pütz","doi":"10.1007/978-3-322-86842-8_25","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_25","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130641711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Extended Commercially Oriented Functionality Class for Network-based IT Systems 基于网络的IT系统的扩展商业导向功能类
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_19
A. Herrigel, R. French, H. Siebert, Helmut G. Stiegler, H. Tabuchi
{"title":"The Extended Commercially Oriented Functionality Class for Network-based IT Systems","authors":"A. Herrigel, R. French, H. Siebert, Helmut G. Stiegler, H. Tabuchi","doi":"10.1007/978-3-322-86842-8_19","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_19","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127408618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online-Dienste im Internet - eine kombinierte Anforderungs- und Risikoanalyse 在网上提供的电子服务是风险分析和风险分析的组合
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_20
P. Kirsch, H. Weidner
{"title":"Online-Dienste im Internet - eine kombinierte Anforderungs- und Risikoanalyse","authors":"P. Kirsch, H. Weidner","doi":"10.1007/978-3-322-86842-8_20","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_20","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_2
Birgit Pfitzmann, M. Waidner
{"title":"Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten","authors":"Birgit Pfitzmann, M. Waidner","doi":"10.1007/978-3-322-86842-8_2","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_2","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"27 4 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptographic Containers and the Digital Library 加密容器和数字图书馆
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_3
J. Lotspiech, U. Kohl, Marc A. Kaplan
{"title":"Cryptographic Containers and the Digital Library","authors":"J. Lotspiech, U. Kohl, Marc A. Kaplan","doi":"10.1007/978-3-322-86842-8_3","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_3","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Informationstheoretische Bewertung steganographischer Konzelationssysteme 信息干扰装置评估
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_16
H. Klimant, Rudi Piotraschke
{"title":"Informationstheoretische Bewertung steganographischer Konzelationssysteme","authors":"H. Klimant, Rudi Piotraschke","doi":"10.1007/978-3-322-86842-8_16","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_16","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124404939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sicherheitsmanagement in großen und komplexen Anwendungsgebieten 大规模、复杂的应用领域的安全管理
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_21
Ray H. Matthews, Michael Miller, Angelika Steinacker
{"title":"Sicherheitsmanagement in großen und komplexen Anwendungsgebieten","authors":"Ray H. Matthews, Michael Miller, Angelika Steinacker","doi":"10.1007/978-3-322-86842-8_21","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_21","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sicherheitsproblematik in verteilten, digitalen Videoanwendungen und Präsentation eines technischen Lösungsansatzes zur transparenten Verschlüsselung von MPEG-2 Video 除了安全问题之外
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_12
J. Dittmann, A. Steinmetz
{"title":"Sicherheitsproblematik in verteilten, digitalen Videoanwendungen und Präsentation eines technischen Lösungsansatzes zur transparenten Verschlüsselung von MPEG-2 Video","authors":"J. Dittmann, A. Steinmetz","doi":"10.1007/978-3-322-86842-8_12","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_12","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114745619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Firewallsysteme und neue Sicherheitstechnologien im Internet 它就躲在防火墙背后
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_6
K. Martius
{"title":"Firewallsysteme und neue Sicherheitstechnologien im Internet","authors":"K. Martius","doi":"10.1007/978-3-322-86842-8_6","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_6","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123639288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maßgeschneiderte Trust Center und elektronisches Bezahlen im Internet 不搞抵押中心和在互联网上进行电子支付
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_4
Bertolt Krüger, Frank Damm
{"title":"Maßgeschneiderte Trust Center und elektronisches Bezahlen im Internet","authors":"Bertolt Krüger, Frank Damm","doi":"10.1007/978-3-322-86842-8_4","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_4","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123785841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信