Pub Date : 1900-01-01DOI: 10.1007/978-3-322-86842-8_5
Markus Gerhard, Alexander W. Röhm
{"title":"Freier und sicherer elektronischer Handel mit originalen, anonymen Umweltzertifikaten","authors":"Markus Gerhard, Alexander W. Röhm","doi":"10.1007/978-3-322-86842-8_5","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_5","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-322-86842-8_1
A. Herrigel, A. Perrig, Joseph Ó Ruanaidh
{"title":"A Copyright Protection Environment for Digital Images","authors":"A. Herrigel, A. Perrig, Joseph Ó Ruanaidh","doi":"10.1007/978-3-322-86842-8_1","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_1","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":" 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113947767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-322-86842-8_13
E. Franz, Anja Jerichow, A. Pfitzmann
{"title":"Systematisierung und Modellierung von Mixen","authors":"E. Franz, Anja Jerichow, A. Pfitzmann","doi":"10.1007/978-3-322-86842-8_13","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_13","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-322-86842-8_7
Rainer Falk
{"title":"Formale Spezifikation von Sicherheitspolitiken für Paketfilter","authors":"Rainer Falk","doi":"10.1007/978-3-322-86842-8_7","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_7","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-322-86842-8_24
U. Wilhelm
{"title":"Increasing Privacy in Mobile Communication Systems using Cryptographically Protected Objects","authors":"U. Wilhelm","doi":"10.1007/978-3-322-86842-8_24","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_24","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-322-86842-8_8
U. Faltin, P. Glöckner, U. Viebeg, A. Berger, H. Giehl, D. Hühnlein, S. Kolletzki, T. Surkau
{"title":"On the development of a security toolkit for open networks - New security features in SECUDE","authors":"U. Faltin, P. Glöckner, U. Viebeg, A. Berger, H. Giehl, D. Hühnlein, S. Kolletzki, T. Surkau","doi":"10.1007/978-3-322-86842-8_8","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_8","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-322-86842-8_18
A. Hawes, Angelika Steinacker
{"title":"Combining Assessment Techniques from Security and Safety to Assure IT System Dependability - The SQUALE Approach","authors":"A. Hawes, Angelika Steinacker","doi":"10.1007/978-3-322-86842-8_18","DOIUrl":"https://doi.org/10.1007/978-3-322-86842-8_18","url":null,"abstract":"","PeriodicalId":131062,"journal":{"name":"Verläßliche IT-Systeme","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}