2008
DOI: 10.1007/s11623-008-0026-7
|View full text |Cite
|
Sign up to set email alerts
|

Sicherheitsmechanismen für kontaktlose Chips im deutschen elektronischen Personalausweis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 1 publication
0
6
0
1
Order By: Relevance
“…It has the following three main applications: (1) the ePass application (this application is only available for mandatory tasks), (2) mutual online identification, and (3) qualified electronic signature (see Bender et al 2008). In SEMPROM, we used the neuer Personalausweis (nPA) infrastructure.…”
Section: Controlling Access To Personal Data In a Dpmmentioning
confidence: 99%
“…It has the following three main applications: (1) the ePass application (this application is only available for mandatory tasks), (2) mutual online identification, and (3) qualified electronic signature (see Bender et al 2008). In SEMPROM, we used the neuer Personalausweis (nPA) infrastructure.…”
Section: Controlling Access To Personal Data In a Dpmmentioning
confidence: 99%
“…In addition, some identity management systems (e.g. [13], [1]) rely on the secure computing environment of trusted modules.…”
Section: Designmentioning
confidence: 99%
“…We further evaluate the case of the German eID. It is one of the most privacy-friendly designs [1]. Their drawback, however, lies in the requirement of certified card readers, which decreases usability.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
“…Sofern der Nutzer noch nicht bekannt ist, wird von Online-Anbietern häufig auf eine Lieferung per Nachnahme zurückgegriffen, um die fehlende Identi- Eine ausführliche Beschreibung der Online-Authentisierung findet sich in [3]. Hier werden heute üblicherweise für den ersten Schritt eine Nutzer-Authentisierung mittels Nutzername und Passwort (oder PIN) eingesetzt, wobei dies eine schon bestehende Beziehung zwischen Nutzer und Dienstanbieter voraussetzt.…”
Section: Eid Und Signaturunclassified