You are here: Start / Service / Download

Papers on security in information technology

This download area provides you with several papers and articles on security in information technology. Use our archive to access older papers and articels.

(Please note that some of the articles are only available in German).

PCI
Biometrics
Electronic Health Card
Cryptography
Secure electronic payment systems
Signature applications
Security managements / Network security
Date Protection
others

Payment Card Industry

The Payment card industry requires security measures, iX 07/2008
Manuel Atug, Randolf Skerka

(German article)
[PDF | DE]

PCI DSS Requirements in the Context of European Data Protection Law, Matthias Hauß
[PDF | EN]

PCI DSS as basis for ISO 27001 implementation, Matthias Hauß, published in: Karasu, Grudzien, Transformation der Bank-IT - Schlaglichter auf innovative Aspekte

(German article)
[PDF | DE]

Zum Seitenanfang

Common Criteria

Smartphone applications - Common Criteria is going Mobile
Jens Oberender
[PDF | EN]

 

Secure delivery of certified products
Dr. Jens Oberender during the 15th ICCC in New Delhi
Presentation [PDF | EN]
Paper [PDF | EN]

Zum Seitenanfang

Biometrics

Testing scope for the determination of error rates in biometric systems.
Peter Unruh

(German article)
[PDF | DE]

Zum Seitenanfang

Electronic Health Card

Testsuite and conformance tests for chip cards in the German health sector
Detlef Kraus, Maximilian Reinders

(German article)
[PDF | DE]

Zum Seitenanfang

Cryptography

Rijndael-presentation on the GMD Smartcard Workshop
Detlef Kraus, Michael Welschenbach

(German article)
[PDF | DE]

DUD-contribution AES June 2001
Michael Welschenbach

(German article)
[PDF | DE]

Elliptic curve cryptography
Dr. Dirk Feldhusen

(German article)
[PDF | DE]

Zum Seitenanfang

Secure electronic payment systems

Secure payment systems in open networks
Dr. Thomas F. Denny

(German article)
[PDF | DE]

Integrity mechanism in German and international payment systems
Detlef Kraus
[PDF | EN]

Security services in card payment systems
Sandro Amendola, Dr. Waldemar Grudzien

(German article)
[PDF | DE]

Zum Seitenanfang

Signature applications

PKI - From Business Case to Technology
Thomas Hueske, Dagmar Schoppe

(German article)
[PDF | DE]

Trusted Pocket Signer
Detlef Kraus, Christoph Sesterhenn

(German article)
[PDF | DE]

ZKA-Signature applications in the German banking industry
Dr. Detlef Hillen

(German article)
[PDF | DE]

(New) approaches to business modells for the application of digital signatures
Michael Welschenbach

(German article)
[PDF | DE]

Zum Seitenanfang

Security Managements / Network Security

SQL Injection: How programming errors can turn into catastrophes, iX 02/2010
Daniel Marner, Matthias Hauß

(German article)
[PDF | DE]

Gürgens, Rudolph, Vogt, On the Security of Fair Non-repudiation Protocols
Dr. Sigrid Gürgens, Dr. Carsten Rudolph, Dr. Holger Vogt
[PDF | EN]

On the Security of Personal Digital Assistants (PDA)
Detlef Kraus

(German article)
[PDF | DE]

Information security against the backdrop of legal requirements
Randolf Skerka

(German article)
[PDF | DE]

Mobile Security - Security of mobile devices
Manuel Atug

(German article)
[PDF | DE]

Security in internet credit card transactions
Manuel Atug, Randolf Skerka

(German article)
[PDF | DE]

Zum Seitenanfang

Data Protection

Privacy Impact Assessment (PIA)
Jana Ehlers, Matthias Hauß

(German article)
[PDF | DE]

Zum Seitenanfang

Others

3.5 Terabyte to protect against money laundering
Fiducia

(German article)
[PDF | DE]

Automotive Security
Sandro Amendola
[PDF | EN]

Zum Seitenanfang