Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BibTeX records: Gisela Quiring-Kock

download as .bib file

@article{DBLP:journals/dud/Quiring-Kock13,
  author       = {Gisela Quiring{-}Kock},
  title        = {Entwurf EU-Verordnung {\"{u}}ber elektronische Identifizierung
                  und Vertrauensdienste},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {37},
  number       = {1},
  pages        = {20--24},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11623-013-0006-4},
  doi          = {10.1007/S11623-013-0006-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiring-Kock13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiring-Kock12,
  author       = {Gisela Quiring{-}Kock},
  title        = {Anforderungen an ein Datenschutzmanagementsystem},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {36},
  number       = {11},
  pages        = {832--836},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11623-012-0282-4},
  doi          = {10.1007/S11623-012-0282-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiring-Kock12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiring-Kock10,
  author       = {Gisela Quiring{-}Kock},
  title        = {Zertifizierungen und ihre Bedeutung},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {3},
  pages        = {178--181},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0029-z},
  doi          = {10.1007/S11623-010-0029-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiring-Kock10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/HeibeyQ10,
  author       = {Hanns{-}Wilhelm Heibey and
                  Gisela Quiring{-}Kock},
  title        = {Biometrische Authentisierung - M{\"{o}}glichkeiten und Grenzen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {34},
  number       = {5},
  pages        = {332--333},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11623-010-0099-y},
  doi          = {10.1007/S11623-010-0099-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/HeibeyQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiring-Kock09,
  author       = {Gisela Quiring{-}Kock},
  title        = {{PKI} f{\"{u}}r B{\"{u}}rger - transparent, sicher, datenschutzgerecht?
                  - Teil {I:} Public Key Infrastrukturen {(PKI)} - Anforderungen an
                  die Anwendungen},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {33},
  number       = {7},
  pages        = {391--395},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11623-009-0100-9},
  doi          = {10.1007/S11623-009-0100-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiring-Kock09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Quiring-Kock09a,
  author       = {Gisela Quiring{-}Kock},
  title        = {{PKI} f{\"{u}}r B{\"{u}}rger - transparent, sicher, datenschutzgerecht?
                  - Teil {II:} Public Key Infrastrukturen {(PKI)} - Anforderungen an
                  die technischen Standards},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {33},
  number       = {7},
  pages        = {396--398},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11623-009-0101-8},
  doi          = {10.1007/S11623-009-0101-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Quiring-Kock09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/MeintsBBBHQ08,
  author       = {Martin Meints and
                  Heinz Biermann and
                  Manfred Bromba and
                  Christoph Busch and
                  Gerrit Hornung and
                  Gisela Quiring{-}Kock},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Biometric Systems and Data Protection Legislation in Germany},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {1088--1093},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.314},
  doi          = {10.1109/IIH-MSP.2008.314},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/MeintsBBBHQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}