{"title":"Ein nachweisbares Authentikationsprotokoll am Beispiel von UMTS","authors":"Stefanie Pütz","doi":"10.1007/978-3-322-86842-8_25","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_25","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130641711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Herrigel, R. French, H. Siebert, Helmut G. Stiegler, H. Tabuchi
{"title":"The Extended Commercially Oriented Functionality Class for Network-based IT Systems","authors":"A. Herrigel, R. French, H. Siebert, Helmut G. Stiegler, H. Tabuchi","doi":"10.1007/978-3-322-86842-8_19","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_19","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127408618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online-Dienste im Internet - eine kombinierte Anforderungs- und Risikoanalyse","authors":"P. Kirsch, H. Weidner","doi":"10.1007/978-3-322-86842-8_20","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_20","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126328976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kopierschutz durch asymmetrische Schlüsselkennzeichnung mit Signeten","authors":"Birgit Pfitzmann, M. Waidner","doi":"10.1007/978-3-322-86842-8_2","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_2","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"27 4 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic Containers and the Digital Library","authors":"J. Lotspiech, U. Kohl, Marc A. Kaplan","doi":"10.1007/978-3-322-86842-8_3","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_3","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ray H. Matthews, Michael Miller, Angelika Steinacker
{"title":"Sicherheitsmanagement in großen und komplexen Anwendungsgebieten","authors":"Ray H. Matthews, Michael Miller, Angelika Steinacker","doi":"10.1007/978-3-322-86842-8_21","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_21","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sicherheitsproblematik in verteilten, digitalen Videoanwendungen und Präsentation eines technischen Lösungsansatzes zur transparenten Verschlüsselung von MPEG-2 Video","authors":"J. Dittmann, A. Steinmetz","doi":"10.1007/978-3-322-86842-8_12","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_12","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114745619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Firewallsysteme und neue Sicherheitstechnologien im Internet","authors":"K. Martius","doi":"10.1007/978-3-322-86842-8_6","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_6","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123639288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maßgeschneiderte Trust Center und elektronisches Bezahlen im Internet","authors":"Bertolt Krüger, Frank Damm","doi":"10.1007/978-3-322-86842-8_4","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_4","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123785841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}