1

Digital payment systems enabling security and unobservability

Year:
1989
Language:
english
File:
PDF, 1.74 MB
english, 1989
5

Networks without user observability

Year:
1987
Language:
english
File:
PDF, 881 KB
english, 1987
6

Value exchange systems enabling security and unobservability

Year:
1990
Language:
english
File:
PDF, 636 KB
english, 1990
7

More efficient software implementations of (generalized) DES

Year:
1993
Language:
english
File:
PDF, 2.36 MB
english, 1993
11

Properties of protection goals and their integration into a user interface

Year:
2000
Language:
english
File:
PDF, 988 KB
english, 2000
12

Biometrie – wie einsetzen und wie keinesfalls?

Year:
2006
Language:
german
File:
PDF, 170 KB
german, 2006
13

Contra Online-Durchsuchung

Year:
2008
Language:
german
File:
PDF, 157 KB
german, 2008
14

Charakteristika von Schutzzielen und Konsequenzen für Benutzungsschnittstellen

Year:
2000
Language:
german
File:
PDF, 476 KB
german, 2000
15

Einführung in die Steganographie und Ableitung eines neuen Stegoparadigmas

Year:
1998
Language:
german
File:
PDF, 676 KB
german, 1998
18

Digital Rights Management zum Schutz personenbezogener Daten?

Year:
2008
Language:
german
File:
PDF, 468 KB
german, 2008
19

Datenschutz-Schutzziele — revisited

Year:
2009
Language:
german
File:
PDF, 586 KB
german, 2009
20

Risiken der Vorratsspeicherung

Year:
2009
Language:
german
File:
PDF, 174 KB
german, 2009
21

Identity management throughout one's whole life

Year:
2008
Language:
english
File:
PDF, 355 KB
english, 2008
29

[Lecture Notes in Computer Science] Information Hiding Volume 1768 ||

Year:
2000
Language:
english
File:
PDF, 10.17 MB
english, 2000
33

Task state transitions in Ada

Year:
1981
Language:
english
File:
PDF, 503 KB
english, 1981