Verläßliche IT-Systeme最新文献

筛选
英文 中文
Freier und sicherer elektronischer Handel mit originalen, anonymen Umweltzertifikaten 自由安全的电子贸易完全是真实的祈祷
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_5
Markus Gerhard, Alexander W. Röhm
{"title":"Freier und sicherer elektronischer Handel mit originalen, anonymen Umweltzertifikaten","authors":"Markus Gerhard, Alexander W. Röhm","doi":"10.1007/978-3-322-86842-8_5","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_5","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Copyright Protection Environment for Digital Images 数字图像的版权保护环境
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_1
A. Herrigel, A. Perrig, Joseph Ó Ruanaidh
{"title":"A Copyright Protection Environment for Digital Images","authors":"A. Herrigel, A. Perrig, Joseph Ó Ruanaidh","doi":"10.1007/978-3-322-86842-8_1","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_1","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":" 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113947767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Systematisierung und Modellierung von Mixen 系统化和模拟人
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_13
E. Franz, Anja Jerichow, A. Pfitzmann
{"title":"Systematisierung und Modellierung von Mixen","authors":"E. Franz, Anja Jerichow, A. Pfitzmann","doi":"10.1007/978-3-322-86842-8_13","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_13","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Die elektronische Geldbörse 电子钱包
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_11
Susanne Hennecke, P. Wohlmacher
{"title":"Die elektronische Geldbörse","authors":"Susanne Hennecke, P. Wohlmacher","doi":"10.1007/978-3-322-86842-8_11","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_11","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131934563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formale Spezifikation von Sicherheitspolitiken für Paketfilter 搬进的正式规格安全政策
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_7
Rainer Falk
{"title":"Formale Spezifikation von Sicherheitspolitiken für Paketfilter","authors":"Rainer Falk","doi":"10.1007/978-3-322-86842-8_7","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_7","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Increasing Privacy in Mobile Communication Systems using Cryptographically Protected Objects 在使用加密保护对象的移动通信系统中增加隐私
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_24
U. Wilhelm
{"title":"Increasing Privacy in Mobile Communication Systems using Cryptographically Protected Objects","authors":"U. Wilhelm","doi":"10.1007/978-3-322-86842-8_24","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_24","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the development of a security toolkit for open networks - New security features in SECUDE 关于开放网络安全工具包的开发——SECUDE的新安全特性
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_8
U. Faltin, P. Glöckner, U. Viebeg, A. Berger, H. Giehl, D. Hühnlein, S. Kolletzki, T. Surkau
{"title":"On the development of a security toolkit for open networks - New security features in SECUDE","authors":"U. Faltin, P. Glöckner, U. Viebeg, A. Berger, H. Giehl, D. Hühnlein, S. Kolletzki, T. Surkau","doi":"10.1007/978-3-322-86842-8_8","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_8","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining Assessment Techniques from Security and Safety to Assure IT System Dependability - The SQUALE Approach 结合安全与安全评估技术来保证IT系统的可靠性——SQUALE方法
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_18
A. Hawes, Angelika Steinacker
{"title":"Combining Assessment Techniques from Security and Safety to Assure IT System Dependability - The SQUALE Approach","authors":"A. Hawes, Angelika Steinacker","doi":"10.1007/978-3-322-86842-8_18","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_18","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effizientes faires Geld mit skalierbarer Sicherheit 高效公平的钱具有很好的安全性
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_10
H. Petersen
{"title":"Effizientes faires Geld mit skalierbarer Sicherheit","authors":"H. Petersen","doi":"10.1007/978-3-322-86842-8_10","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_10","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123109268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ein effizientes und sicheres digitales Signatursystem 有效且安全的数字统计系统
Verläßliche IT-Systeme Pub Date : 1900-01-01 DOI: 10.1007/978-3-322-86842-8_9
D. Fox
{"title":"Ein effizientes und sicheres digitales Signatursystem","authors":"D. Fox","doi":"10.1007/978-3-322-86842-8_9","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_9","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124256911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信