Dieser Artikel gibt einen Überblick über die Ziele und die Funktionsweise der Sicherheitsmechanismen, die im
deutschen elektronischen Reisepass (ePass) zur Anwendung kommen. Dieses beinhaltet auch die erweiterten Sicherheitsmechanismen, welche in der zweiten Stufe elektronischer Reisepässe hinzukommen.
Stiftung Secure Information and Communication Technologies SIC offers a wide range of cryptography- and security-related Java products, covering all aspects of data and communication security.
As a one-stop source for all IT security needs, www.darkreading.com delivers timely news, malware alerts, product reviews and technical analysis for the urgent minded security professional. With original research, insightful opinion and our close affil...
K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Knowledge Engineering and Knowledge Management. Methods, Models, and Tools., volume 1937 of LNAI, page 352-365. Heidelberg, Springer, (2000)
C. Haley, R. Laney, and B. Nuseibeh. AOSD '04: Proceedings of the 3rd international conference on Aspect-oriented software development, page 112--121. New York, NY, USA, ACM, (2004)
M. Quasthoff, H. Sack, and C. Meinel. n Proc. of the 2007 IEEE / WIC /ACM Int. Conf. on Web Intelligence (WI 2007), (2007)location=Silicon Valley, date=2007.
D. Bernstein. Daniel J. Bernstein
Department of Mathematics, Statistics, and Computer Science (M/C 249), University of Illinois at Chicago, Chicago, IL 606077045, USA, (November 2007)