Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Specifying SSI over EAP: Towards an Even Better Eduroam in the Future

    The Extensible Authentication Protocol (EAP) is a popular protocol for authentication in (wireless) local area networks. The protocol is recommended for use in the 802.1X standard and has, thus, found widespread ...

    Ronald Petrlic in Advanced Information Networking and Applications (2024)

  2. No Access

    Chapter and Conference Paper

    MTA Extension for User-Friendly Enforcement of Mandatory TLS Encryption

    Since TLS is not yet available on all Mail Transfer Agents (MTA), mandatory TLS encryption for SMTP connections could result in single emails not being delivered. Therefore, TLS encryption for SMTP connections...

    Max Körber, Leo V. Dessani, Ronald Petrlic in Advanced Information Networking and Applic… (2023)

  3. No Access

    Chapter and Conference Paper

    KerberSSIze Us: Providing Sovereignty to the People

    Kerberos is an old, yet widely used protocol for authentication and authorization in (local) network environments. Self Sovereign Identity (SSI), on the other hand, is a relatively new model for managing digital ...

    Ronald Petrlic in Stabilization, Safety, and Security of Distributed Systems (2023)

  4. No Access

    Chapter and Conference Paper

    An Email a Day Could Give Your Health Data Away

    Are doctors allowed to communicate with their patients via email? The GDPR sets the bar high for securing health data: either an end-to-end-encryption (E2EE) or a guaranteed transport encryption needs to be us...

    Christof Lange, Thomas Chang in Data Privacy Management, Cryptocurrencies … (2023)

  5. No Access

    Article

    Rezensionen

    Ludwig Gramlich, Ronald Petrlic in Datenschutz und Datensicherheit - DuD (2022)

  6. Chapter

    Zusammenfassung und Ausblick

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  7. No Access

    Chapter

    Zertifizierung, Akkreditierung

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  8. No Access

    Chapter

    Datenschutz im World Wide Web

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  9. No Access

    Chapter

    Weitere kryptographische Verfahren für PETs

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  10. No Access

    Chapter

    Technische und organisatorische Maßnahmen – toMs

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  11. No Access

    Chapter

    Der (betriebliche oder behördliche) Datenschutzbeauftragte

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  12. No Access

    Chapter

    Ausgewählte Verarbeitungssituationen

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  13. No Access

    Chapter

    Instant Messaging

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  14. No Access

    Chapter

    Einführung in das Datenschutzrecht

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  15. No Access

    Chapter

    Betroffenenrechte

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  16. No Access

    Chapter

    Rolle der der Datenschutz-Aufsichtsbehörde

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  17. No Access

    Chapter

    Einführung

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  18. No Access

    Chapter

    Identitätsmanagement

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  19. No Access

    Chapter

    Elektronische Ausweisdokumente

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

  20. No Access

    Chapter

    Die Rechtsordnung im Allgemeinen

    Ronald Petrlic, Christoph Sorge, Wolfgang Ziebarth in Datenschutz (2022)

previous disabled Page of 3