KRYPTOLOGIE BEUTELSPACHER PDF

Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions. Enlarge cover.

Author:Yolkree Kegis
Country:Nepal
Language:English (Spanish)
Genre:Travel
Published (Last):13 June 2004
Pages:47
PDF File Size:17.14 Mb
ePub File Size:4.31 Mb
ISBN:312-5-67177-409-9
Downloads:70253
Price:Free* [*Free Regsitration Required]
Uploader:JoJocage



Sicherheit und Kryptographie im Internet pp Cite as. Kennt man bereist die Nummer des RFCs, z. Unable to display preview. Download preview PDF. Skip to main content. This service is more advanced with JavaScript available. Advertisement Hide. This is a preview of subscription content, log in to check access. Google Scholar. Ateniese, M. Steiner and G. Tsudik, Authenticated group key agreement and friends. Ballardie, Scalable multicast key distribution. Bauer, Entzifferte Geheimnisse. Methoden und Maximen der Kryptologie.

Springer Verlag, 3. Auflage, Heidelberg Burmester and Y. Desmedt, A secure and efficient conference key distribution system. Desmedt, Efficient and secure conference key distribution. Diaz und J. Springer Verlag Boneh, R. DeMillo und R. Lipton, On the Importance of Checking Computations. Beutelspacher, Kryptologie. Auflage, Verlag Vieweg, Wiesbaden Borisov, I. Goldberg und D. Bieser, Sachstand der gesetzlichen Regelung zur digitalen Signatur. In: Digitale Signaturen, P. Horster Hrsg.

Eli Biham, On Modes of Operation. Balenson, D. McGrew, A. Beker und F. Piper, Cipher Systems. The Protection of Communication. North-wood, London Brassard, Modern Cryptology. Springer LNCS Rung und H. Verlag Vieweg, Braunschweig und Wiesbaden Beutelspacher, J. Schwenk und K. Wolfenstetter, Moderne Verfahren der Kryptographie. Auflage , Vieweg Verlag Wiesbaden. Becker and U. Wille, Communication complexity of group key distribution. November Dierks, C. Diffie und M. Hellman, New Directions in Cryptography.

Diffie, The first ten years of Public Key Cryptography. Simmons, ed. Delfs und H. Knebl, Introduction to Cryptography. Springer Verlag, Heidelberg Dobbertin, Cryptanalysis of MD5 Compress. Diffie, P. Wiener, Authentication and authenticated key exchanges. Cracking DES. Electronic Frontier Foundation.

IEEE Trans. IT , — Ethereal: Sniffing the glue that holds the Internet together. Alan O. Freier, Philip Karlton, Paul C. Fluhrer, I. Mantin und A. Fumy und H. Ries, Kryptographie. Oldenbourg Verlag, 2. History of PGP. Horster, V. Michels und H. Harney, C. Muckenhirn and T. Rivers, Group key management protocol gkmp architecture. IETF Draft, Horster, Kryptologie. BI-Verlag, Mannheim Huitema, IPv6, die neue Generation. IPSec Working Group ipsec.

Ingemarsson, D. Tang and C. Wong, A conference key distribution system. Computer and Comm. Security, Athen Kaliski and M. CryptoBytes Vol. Kranakis, Primality and Cryptography. Teubner Verlag, Stuttgart Krawczyk, H. Lopht Heavy Industries, Inc. Workshop on Fast Software Encryption. LNCS , S. CrossRef Google Scholar. Menezes, P.

DLINK 2540T MANUAL PDF

ISBN 13: 9783834800145

Numerous and frequently-updated resource results are available from this WorldCat. Please choose whether or not you want other users to be able to see on your profile that this library is a favorite of yours. Finding libraries that hold this item Occupying a niche in the halls of the ivory tower of pure mathematics for nearly two millennia, number theory now forms a pillar of modern society. This book is the best explanation available today of how that pillar was constructed. You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

CHINESE NORINCO SKS MANUAL PDF

Albrecht Beutelspacher

.

LIBRO TEORIAS DE LA PERSONALIDAD BARBARA ENGLER PDF

Kryptologie

.

JAWDAT SAID PDF

Kryptologie

.

Related Articles