[KNIHA][B] SSL and TLS: Theory and Practice

R Oppliger - 2023 - books.google.com
Now in its Third Edition, this completely revised and updated reference provides a thorough
and comprehensive introduction into the SSL, TLS, and DTLS protocols, explaining all the …

Towards GDPR-compliant data processing in modern SIEM systems

F Menges, T Latzo, M Vielberth, S Sobola, HC Pöhls… - Computers & …, 2021 - Elsevier
The introduction of the General Data Protection Regulation (GDPR) in Europe raises a
whole series of issues and implications on the handling of corporate data. We consider the …

SSL/TLS session-aware user authentication–Or how to effectively thwart the man-in-the-middle

R Oppliger, R Hauser, D Basin - Computer Communications, 2006 - Elsevier
Man-in-the-middle attacks pose a serious threat to SSL/TLS-based electronic commerce
applications, such as Internet banking. In this paper, we argue that most deployed user …

[PDF][PDF] Digital signatur. En eksemplarisk analyse af en teknologis indre mekanismer og processer

N Jørgensen - Lokaliseret d, 2018 - webhotel4.ruc.dk
Denne artikel er et case-studium af digital signatur. Formalet er at redegøre for begrebet “en
teknologis indre mekanismer og processer”. Meget kort sagt henviser begrebet til hvordan …

Distributed ONS and its Impact on Privacy

B Fabian, O Gunther - 2007 IEEE International Conference on …, 2007 - ieeexplore.ieee.org
The EPC Network is an industry proposal to build a global information architecture for
objects carrying RFID tags with electronic product codes (EPC). A so-called object naming …

Usage control enforcement-a survey

ÅA Nyre - … Conference on Availability, Reliability, and Security, 2011 - Springer
Sharing information allows businesses to take advantage of hidden knowledge, improve
work processes and cooperation both within and across organisations. Thus there is a need …

Social life of PKI: sociotechnical development of Korean public-key infrastructure

D Park - IEEE Annals of the History of Computing, 2015 - ieeexplore.ieee.org
Until the late 1990s, technology analysts expected public-key infrastructure (PKI) technology
to be an essential element of online security systems. Today however, South Korea …

Certification authorities under attack: A plea for certificate legitimation

R Oppliger - IEEE internet computing, 2013 - ieeexplore.ieee.org
Several recent attacks against certification authorities (CAs) and fraudulently issued
certificates have put the security and usefulness of the Internet public-key infrastructure (PKI) …

Mercury: Recovering forgotten passwords using personal devices

M Mannan, D Barrera, CD Brown, D Lie… - … Cryptography and Data …, 2012 - Springer
Instead of allowing the recovery of original passwords, forgotten passwords are often reset
using online mechanisms such as password verification questions (PVQ methods) and …

[KNIHA][B] Mobile Qualifizierte Elektronische Signaturen: Analyse der Hemmnisfaktoren und Gestaltungsvorschläge zur Einführung

H Roßnagel - 2009 - books.google.com
Heiko Roßnagel diskutiert die Ursachen für den fehlenden Markterfolg elektronischer
Signaturen. Er stellt mobile qualifizierte elektronische Signaturen als Alternative vor und …