Plus d’un million de livres, à portée de main !
Bookbot

Walter Fumy

    Kryptographie
    Sicherheitsschnittstellen
    Standards und Patente zur IT-Sicherheit
    Handbook of eID Security
    Advances in cryptology
    Enterprise security
    • 2010

      Handbook of eID Security

      Concepts, Practical Experiences, Technologies

      • 316pages
      • 12 heures de lecture

      In the forthcoming years, citizens of many countries will be provided with electronic identity cards. eID solutions may not only be used for passports, but also for communication with government authorities or local administrations, as well as for secure personal identification and access control in e-business. Further eID applications will be implemented in the healthcare sector. For some of these solutions we will not need a physical data carrier at all.The Handbook of eID Security is the first source presenting a comprehensive overview of this strongly discussed topic. It provides profound information on the following - Which are the latest concepts, technical approaches, applications and trends in the field of eID?- Which areas of application are covered by the different eID concepts?- Which security mechanisms are used, for what reasons, and how can their reliability be ensured?- How will the security of personal data be guaranteed?This book is a perfect source of information for all persons working in industry, banking, healthcare, research institutes, administrations and public - who are involved in the development of eID application concepts, technical solutions, and of devices used for transfer and read out data to and from eIDs,- who have or will have to do with eID applications in their daily work, and- who participate in informing and discussing about the security and transparency of eID solutions.

      Handbook of eID Security
    • 2006

      Enterprise security

      • 264pages
      • 10 heures de lecture
      3,7(3)Évaluer

      Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise. Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cryptographic techniques, intelligent tokens, public key infrastructures, IAM technologies) is provided. The book features detailed discussions of practical experiences in different sectors, including the automotive industry, financial services, e-health, and e-government.

      Enterprise security
    • 1997

      Advances in cryptology

      • 507pages
      • 18 heures de lecture

      EUROCRYPT '97, the 15th annual conference on cryptographic techniques, was organized by the International Association for Cryptologic Research (IACR), which hosts two series of international conferences each year: EUROCRYPT in Europe and CRYPTO in the United States. The conference originated 15 years ago in Germany with the Burg Feuerstein Workshop, initiated by Thomas Beth, bringing together 76 participants from 14 countries for the first open meeting focused on modern cryptography. Since then, the conference has been held annually in various European locations, such as Udine, Paris, and Saint-Malo, and has seen steady growth. The IACR became involved after the second conference, and the name EUROCRYPT has been used since the Paris meeting in 1984. For its 15th anniversary, the conference returned to Germany. The scientific program for EUROCRYPT '97 was curated by an 18-member committee that reviewed 104 high-quality submissions, resulting in 34 accepted papers presented in these proceedings. Additionally, the conference featured two invited talks by Ernst Bovelander and Gerhard Frey.

      Advances in cryptology
    • 1994

      InhaltsverzeichnisSchnittstellendesign.Sicherheitsschnittstellen und formale Software-Entwicklung.Evaluationen von Security APIs.Designmethoden für kryptographische Schnittstellen und deren Subsysteme.Konzept und Realisierung einer allgemeinen Key Management Schnittstelle.Sicherheitsschnittstellen in verteilten Systemen.Security API in Client-Server-Systemen mit rollenbasierter Zugriffskontrolle.CryptoManager — Eine intuitive Programmierschnittstelle für kryptpographische Systeme.X/Open and Security.GSS-API Implementierung für X.509 Strong Authentication.Security-API in SecuDE.Security-API eines Sicherheits-Moduls für den Einsatz in heterogenen Rechnerumgebungen.Smart Card APIs im Einsatz am Beispiel der STARMOD API.Sicherheitsschnittstellen im Banken- und Telekombereich.Kryptographisches Application Programming Interface.TeleTrusT Security API — Aufgabe der TeleTrusT-Arbeitsgruppe ‚Anwendungen‘.Eine Sicherheitsplattform für zukünftige Telekommunikationsanwendungen und –dienste.Secure Common ISDN Application Programming Interface (S-CAPI).

      Sicherheitsschnittstellen
    • 1988