Nomenclatura - Encyclopedia of modern cryptography and internet security: from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Norderstedt
BoD
2019
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | 410 Seiten Illustrationen, Diagramme 21 cm x 14.8 cm, 595 g |
ISBN: | 9783746066684 3746066689 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046065180 | ||
003 | DE-604 | ||
005 | 20230728 | ||
007 | t | ||
008 | 190725s2019 gw a||| ed|| 00||| eng d | ||
015 | |a 19,N29 |2 dnb | ||
016 | 7 | |a 1190111799 |2 DE-101 | |
020 | |a 9783746066684 |c Paperback : EUR 12.49 (DE), EUR 12.90 (AT), CHF 18.50 (freier Preis) |9 978-3-7460-6668-4 | ||
020 | |a 3746066689 |9 3-7460-6668-9 | ||
024 | 3 | |a 9783746066684 | |
035 | |a (OCoLC)1108912917 | ||
035 | |a (DE-599)DNB1190111799 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-SH | ||
049 | |a DE-860 |a DE-521 |a DE-B768 |a DE-634 |a DE-19 |a DE-384 |a DE-12 |a DE-525 |a DE-29T |a DE-11 |a DE-20 |a DE-898 |a DE-703 |a DE-83 |a DE-522 |a DE-37 |a DE-739 |a DE-M347 |a DE-355 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 205 |0 (DE-625)143613: |2 rvk | ||
084 | |a SK 800 |0 (DE-625)143256: |2 rvk | ||
084 | |a SR 200 |0 (DE-625)143355: |2 rvk | ||
084 | |a AP 12600 |0 (DE-625)6865: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Nomenclatura - Encyclopedia of modern cryptography and internet security |b from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys |c Linda A. Bertram, Gunther van Dooble et al. editors |
264 | 1 | |a Norderstedt |b BoD |c 2019 | |
300 | |a 410 Seiten |b Illustrationen, Diagramme |c 21 cm x 14.8 cm, 595 g | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Cryptography | |
650 | 4 | |a Encryption | |
650 | 4 | |a Data Security | |
650 | 4 | |a Encyclopaedia | |
650 | 4 | |a Dictionary | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4066724-8 |a Wörterbuch |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Bertram, Linda A. |0 (DE-588)1191381455 |4 edt | |
700 | 1 | |a Dooble, Gunther van |0 (DE-588)1191381773 |4 edt | |
710 | 2 | |a Books on Demand GmbH (Norderstedt) |0 (DE-588)10068934-6 |4 pbl | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=8ee76d92882045ddbbd274d55394c98a&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031446454&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-031446454 |
Datensatz im Suchindex
_version_ | 1804180345599295489 |
---|---|
adam_text | NOMENCLATURA
LIST
OF
MORE
THAN
330
ENTRIES
INTRODUCTION
LINDA
A.
BERTRAM
AND
GUNTHER
VAN
DOOBLE:
NOMENCLATURA:
WHAT
DOES
A
MODERN
ENCYCLOPEDIA
OF
CRYPTOGRAPHY
AND
INTERNET
SECURITY
OFFER
FOR
THE
EDUCATION,
DISCUSSION
AND
SOVEREIGNTY
OF
LEARNING
PROFESSIONALS?
-
AN
INTERDISCIPLINARY
VIEW
ON
THE
TRANSFORMATION
OF
CRYPTOGRAPHY:
FUNDAMENTAL
CONCEPTS
OF
ENCRYPTION,
MILESTONES,
MEGA-TRENDS
AND
SUSTAINABLE
CHANGE
IN
REGARD
TO
SECRET
COMMUNICATIONS
AND
ITS
IDEAS,
KEY-TERMS,
DEFINITIONS
AND
GOOD
PRACTICE
..........................
17
ACCESS
CONTROL
..............
62
AE
-
ADAPTIVE
ECHO
..........
62
AES
-
ADVANCED
ENCRYPTION
STANDARD
....63
AE-TOKEN
........................
66
ALGORITHM
......................
66
ALICE
AND
BOB
.................
68
ANDROID
...........................
68
ANONYMITY
.....................
69
ANSWER
METHOD
.............
70
ASYMMETRIC
CALLING
.....
71
ASYMMETRIC
ENCRYPTION
.................
71
ATTACK
.............................
73
AUDIT
..............................
74
AUTHENTICATION
..............
77
AUTHORIZATION
...............
79
AUTOCRYPT
......................
80
AVAILABILITY
....................
80
BACKDOOR
.......................
81
BIG
SEVEN
STUDY
(2016)
.........................
84
BIOMETRIC
PASSPORT
......
85
BIRTHDAY
PROBLEM
.........
87
BLINDING
..........................
88
BLOCK
CIPHER
..................
90
BLUETOOTH
.......................
92
BOTAN
..............................
92
BOUNCY
CASTLE
...............
93
BROADCAST
(IN
CRYPTOGRAPHY)
..........
94
BRUTE-FORCE
ATTACK
........
94
6
ENCYCLOPEDIA
OF
MODERN
CRYPTOGRAPHY
AND
INTERNET
SECURITY
BULLRUN
(DECRYPTION
PROGRAM)
....................
95
BUTTON
............................
96
BUZZ/E*IRC
....................
96
C/O
-
(CARE-OF)-
FUNCTION
.........................
97
CBC
-
CIPHER
BLOCK
CHAINING
.........................
97
CAESAR
CIPHER
................
98
CERTIFICATE
AUTHORITY
.
100
CHAOS
THEORY
...............
101
CIPHER
............................
102
CIPHERTEXT
....................
104
CIPHERTEXT
STEALING
.....
105
CLIENTSIDE
ENCRYPTION.
105
C-MAIL
............................
106
COLLISION
ATTACK
...........
106
COMPLEXITY
...................
106
CONFIDENTIALITY
............
109
CONFIGURATION
..............
109
CONGESTION
CONTROL
.....
109
CONTINUOUS
IMPROVEMENT
..........
109
CORRECTIVE
ACTION
.......
ILL
CRAWLER
.........................
ILL
CREDENTIAL
.....................
ILL
CRYPTANALYSIS
...............
112
CRYPTO-AGILITY
.............
114
CRYPTOGRAM
..................
114
CRYPTOGRAPHIC
CALLING
115
CRYPTOGRAPHIC
DISCOVERY
................
117
CRYPTOGRAPHIC
DNA
....
118
CRYPTOGRAPHIC
PROTOCOL
...................
119
CRYPTOGRAPHIC
ROUTING
....................
120
CRYPTOGRAPHIC
TORRENTS
...................
121
CRYPTOGRAPHY
&
CRYPTOLOGY
...............
122
CRYPTOPAD
...................
123
CRYPTO-PARTIES
.............
124
CRYPTOOL
......................
125
CSEK
-
CUSTOMER
SUPPLIED
ENCRYPTION
KEYS
.............................. 126
DATA
EXPOSURE
.............
127
DATA
OBFUSCATION
........
127
DATA
VALIDATION
...........
128
DATABASE
ENCRYPTION
..128
DECENTRALIZED
COMPUTING
...............
130
DELTA
CHAT
....................
130
DEMOCRATIZATION
OF
ENCRYPTION
...............
132
DENIABLE
ENCRYPTION
...
132
DFA
-
DIFFERENTIAL
FAULT
ANALYSIS
........................133
DHT
-
DISTRIBUTED
HASH
TABLE
.............................
134
7
NOMENCLATURA
DIGEST
ACCESS
EPKS
-
ECHO
PUBLIC
KEY
SHARE
PROTOCOL
...........
,.161
AUTHENTICATION
.....
.134
DIGITAL
SIGNATURE
.......
.135
ETM
-
ENCRYPT-THEN-
DNS
-
DOMAIN
NAME
MAC
............................
.162
SYSTEM
.......................
.137
EXPONENTIAL
DOCUMENTED
ENCRYPTION
.............
.164
INFORMATION
...........
.138
EXPONENTIAL
KEY
DOOBLE
WEB
BROWSER
.
138
EXCHANGE
................
.166
DTLS
-
DATAGRAM
E2EE
-
END-TO-END
TRANSPORT
LAYER
ENCRYPTION
.................
.167
SECURITY
......................
.139
FACIAL
RECOGNITION
EAVESDROPPING
...........
.139
SYSTEM
....................
.168
ECHELON
...................
.141
FIASCO
KEYS
&
FIASCO
ECHO
(PROTOCOL)
..........
.143
FORWARDING
............
.169
ECHO
ACCOUNTS
...........
.146
FILE-ENCRYPTOR
............
.170
ECHO
MATCH
................
.146
FILE-SHARING
................
.170
ECHO-GRID
....................
.147
FINGERPRINT
..................
.171
ECHO-NETWORK
...........
.148
FINSPY
..........................
.172
EDGAR
ALLAN
POE
.........
.149
FIRECHAT
......................
.173
E-GOVERNMENT
...........
.150
FIREWALL
.......................
.174
EIGAMAL
.......................
.152
FLOODING
......................
.175
ELLIPTIC-CURVE
FORWARD
SECRECY
........
.175
CRYPTOGRAPHY
........
.152
FORWARD-SECRECY-
E-MAIL
INSTITUTION
......
.154
CALLING
.....................
.176
ENCAPSULATION
............
.154
FREEDOM
OF
SPEECH
....
.176
ENCRYPTION
..................
.155
FREENET
........................
.179
ENIGMA
MACHINE
........
.155
FULL
ECHO......................
.179
ENTROPY
.......................
.159
F2F
-
FRIEND-TO-FRIEND
...
.179
EPHEMERAL
&
SESSION
GCM
-
GALOIS/COUNTER
KEYS
........................
.159
MODE-ALGORITHM
.......
.180
GEMINI
.........................
.180
8
ENCYCLOPEDIA
OF
MODERN
CRYPTOGRAPHY
AND
INTERNET
SECURITY
GNUPG
-
GNU
PRIVACY
GUARD
.......................... 182
GNUTELLA
.......................
182
GOING
THE
EXTRA
MILE...
182
GOLDBUG
(E-MAIL
PASSWORD)
................
184
GOLDBUG
(SOFTWARE)
....
184
GOPPACODE
..................
185
GRAPH-THEORY
..............
186
GROUP
CHAT
...................
188
GUI
-
GRAPHICAL
USER
INTERFACE
......................189
HALF
ECHO
......................
189
HASH
FUNCTION
..............
190
HMAC
-
KEYED-HASH
MESSAGE
AUTHENTICATION
CODE..
191
HOMOMORPHIC
ENCRYPTION
...............
192
HOMOMORPHIC
SECRET
SHARING
.....................
193
HTTPS
...........................
193
HUMAN
RIGHTS
..............
193
HYBRID
ENCRYPTION
.....
196
IDENTIFICATION
...............
197
IMAP
-
INTERNET
MESSAGE
ACCESS
PROTOCOL
.....................
197
IMPERSONATOR
.............
197
INFORMATION
SECURITY
..
198
INFORMATION-
THEORETIC
SECURITY...
199
INFORMATION
THEORY
....199
INNOVATION
...................
202
INSTANT
MESSAGING
......
203
INSTITUTION
....................
204
INTEGER
FACTORIZATION
..
205
INTEGRITY
.......................
206
INTERNET
...................
207
INTERNET
SECURITY
........
207
IPFS
-
INSTANT
PERFECT
FORWARD
SECRECY
.........
208
IRC
-
INTERNET
RELAY
CHAT
..............................
209
ISOMORPHISM
...............
209
ITERATED
FUNCTION
........
210
JAVA
...............................
210
JUGGERKNOTS/
JUGGERKNOT
KEYS
.....
211
JUGGERNAUT
PAKE
PROTOCOL
...................
212
KDF
-
KEY
DERIVATION
FUNCTION
.......................
214
KERBEROS
......................
215
KERCKHOFFS*
PRINCIPLE.
.216
KERNEL
...........................
216
KEY
................................
217
KEYBOARD
.....................
218
KEY
EXCHANGE
I
ESTABLISHMENT
.........
218
KEY
SIZE
........................
223
9
NOMENCLATURA
KEY
STRETCHING
............
KEYSTROKE
LOGGING
.....
KEYSYNC
.......................
LATTICE-BASED
CRYPTOGRAPHY
.........
LIBCURL
..........................
LIBGCRYPT
......................
LIBSPOTON
...................
LISTENER
........................
LOGIN
.............................
MAC
-
MESSAGE
AUTHENTICATION
CODE..
MAGNET-URI
................
MALLEABILITY
.................
MASS
SURVEILLANCE
......
MATRIX
..........................
MATRYOSHKA
DOLL
........
MCELIECE
ALGORITHM
....
MCNOODLE
LIBRARY
......
MEASUREMENT
.............
MEDIA
BIAS
...................
MELODICA
-
MULTI
ENCRYPTED
LONG
DISTANCE
CALLING
..........
MESH
NETWORKING
......
META-DATA
...................
MITM
-
[HU]MAN-IN-
THE-MIDDLE
ATTACK......
MITM
-
MEET-IN-THE-
MIDDLE
ATTACK
.............
MIX
NETWORK
...............
MONITORING
..................
247
MOORE S
LAW
.................
248
MOSAIC
..........................
248
MULTI-ENCRYPTION
.........
249
MUTUAL
AUTHENTICATION
........
250
NEIGHBOR
......................
251
NETCAT
...........................
251
NEULAND
........................
251
NIST
-
NATIONAL
INSTITUTE
OF
STANDARDS
AND
TECHNOLOGY
...........251
NOVA
...........................
252
NTL
-
NUMBER
THEORY
LIBRARY
..........................
252
NTRU
............................
252
NULL
CIPHER
...................
253
NUMBER
THEORY
...........
254
OFFSYSTEM
..................
255
OMEMO
.......................
255
OPEN
SOURCE
................
256
OPENPGP-
OPEN
PRETTY
GOOD
PRIVACY
...256
OPENSSH
-
OPEN
SECURE
SHELL
................
257
OPENSSL
-
OPEN
SECURE
SOCKETS
LAYER..
257
OPPORTUNISTIC
ENCRYPTION
.............
258
OTM
-
ONE-TIME-
MAGNET
.......................
259
224
226
227
227
229
229
229
230
230
230
231
232
233
236
237
239
240
240
240
241
242
244
244
246
247
10
ENCYCLOPEDIA
OF
MODERN
CRYPTOGRAPHY
AND
INTERNET
SECURITY
OTP
-
ONE-TIME-PAD
....
259
OTR
-
OFF-THE-RECORD
....
260
OZONE
ADDRESS
POSTBOX
....................
260
PADDING
.........................
261
PANDAMONIUM
.............
262
PASSPHRASE
...................
263
PASS-THROUGH
................
263
PASSWORD
......................
264
PATCH-POINTS
................
264
PEGASUS
SPYWARE
........
264
PEPPER
...........................
265
PERFORMANCE
................
266
PGP
...............................
266
PIGEONHOLE
PRINCIPLE
..
267
PKI
-
PUBLIC
KEY
INFRASTRUCTURE
..............
268
PLAINTEXT
.......................
269
PLAUSIBLE
DENIABILITY
..
270
POINT-TO-POINT
.............
271
POLICY
............................
272
POP3
-
POST
OFFICE
PROTOCOL
.......................272
POPTASTIC
..................
273
POSTGRESQL
..................
274
POST-QUANTUM
CRYPTOGRAPHY
..........
275
PRISM
(SURVEILLANCE
PROGRAM)
..................
276
PRIVACY
.........................
277
PRIVACY
AMPLIFICATION
279
PRIVATE
KEY
..................
280
PRIVATE
SERVERS
...........
281
PSEUDORANDOM
NUMBER
GENERATOR
.
281
PUBLIC
KEY
CERTIFICATE
282
PUBLIC
KEY
CRY
POTOGRAPHY
........
283
PURE-FS-PURE
FORWARD
SECRECY
.........
284
P2P
-
PEER-TO-PEER
.........
284
QT
..................................
284
QUANTUM
COMPUTING
..
285
QUANTUM
CRYPTOGRAPHY
..........
285
QUANTUM
INFORMATION
SCIENCE
.....................
287
QUANTUM
LOGIC
GATE.
..288
RAINBOW
TABLE
............
288
RANDOM
........................
289
RANDOM
NUMBER
GENERATION
..............
289
RASPBERRY
PI
................
292
REMOTE
CONTROL
SYSTEMS
SPYWARE....
292
REPLEO
........................
293
REPLAY
ATTACK
.............
293
REQUIREMENT
...............
294
RETROSHARE
..................
294
REVIEW
.........................
295
REWIND
.........................
295
ROSETTA-CRYPTOPAD
....
295
11
NOMENCLATURA
ROT13
...........................
297
ROUTING
.........................
298
RSA
................................
299
SALT,
CRYPTOGRAPHIC
.....
299
SCTP
-
STREAM
CONTROL
TRANSMISSION
PROTOCOL
.......................
300
SECRED
-
SPRINKLING
EFFECT
............................
300
SECRET
STREAMS
............
300
SECURE
BY
DESIGN
.........
301
SECURE
CHANNEL
............
301
SECURE
COMMUNICATION
......
303
SECURITY
.........................
304
SECURITY
THROUGH
OBSCURITY
.................
304
SELECTORS
......................
305
SERVER
...........................
308
SESSION
MANAGEMENT
.
308
SHA-3
...........................
309
SHARED
SECRET
...............
310
SHOR S
ALGORITHM
.........
310
SIDE-CHANNEL
ATTACK
..311
SIGNAL
PROTOCOL
............
312
SIMULACRA
......................
313
SIP-HASH
......................
314
SMALL
WORLD
PHENOMENON
...........
314
SMOKE
ALIASES
FOR
KEY
EXCHANGE
..........
316
SMOKE
CRYPTO
CHAT
APP
..........................
316
SMOKESTACK
................
317
SMTPS
-
SIMPLE
MAIL
TRANSFER
PROTOCOL
SECURED
........................
317
SMP
-
SOCIALIST
MILLIONAIRE
PROTOCOL
...317
SMP-CALLING
................
319
SPLITTED
SECRET
............
319
SPOT-ON
ENCRYPTION
SUITE
.........................
321
SQLITE
...........................
321
STARBEAM
(ULTRA-
STARBEAM)
...............
322
STARBEAM-ANALYSER
....322
STEGANOGRAPHY
............
322
STREAM
CIPHER
.............
323
SUPER-ECHO
..................
325
SURVEILLANCE
.................
326
SURVEILLANCE,
GLOBAL
.....
328
SYMMETRIC
CALLING
.......
330
SYMMETRIC
ENCRYPTION
..............
330
SYMMETRIC
KEY
...........
331
TCP
-TRANSMISSION
CONTROL
PROTOCOL
.........
331
THE
ALI
BABA
CAVE
.......
331
THE
BOMBE
...................
335
THREEFISH
.....................
336
TIMING
...........................
337
12
ENCYCLOPEDIA
OF
MODERN
CRYPTOGRAPHY
AND
INTERNET
SECURITY
TLS
-
TRANSPORT
LAYER
SECURITY
337
TOKEN
338
TOR
340
TRACKING
COOKIE
340
TRIAD
OF
CIA
342
TRIPLE
DES
345
TROJAN
HORSE
346
TEE
-
TRUSTED
EXECUTION
ENVIRONMENT
347
TURING
MACHINE
348
TURTLE-HOPPING
350
TWOFISH
351
TWO-WAY-CALLING
352
UDP
-
USER
DATAGRAM
PROTOCOL
352
URL
-
UNIFORM
RESOURCE
LOCATOR
353
URL-DISTILLER
353
URN
-
UNIFORM
RESOURCE
NAME
354
VAPOR
PROTOCOL
354
VIRTUAL
KEYBOARD
355
VEMI
-
VIRTUAL
E-MAIL
INSTITUTION
356
VIGENERE
CIPHER
356
VOLATILE
ENCRYPTION
359
WEB-OF-T
RUST
359
WIDE
LANES
360
XKEYSCORE
(SURVEILLANCE
PROGRAM)
360
XMPP
-
EXTENSIBLE
MESSAGING
AND
PRESENCE
PROTOCOL
361
XOR
361
YACY
362
ZERO-KNOWLEDGE-
PROOF
363
RND-QUESTIONS
.....
.........................
364
INDEX
OF
FIGURES.............
.... ......
......
368
BIBLIOGRAPHY
..............................
......
372
INDEX
OF
KEYWORDS
...............................
397
13
|
any_adam_object | 1 |
author2 | Bertram, Linda A. Dooble, Gunther van |
author2_role | edt edt |
author2_variant | l a b la lab g v d gv gvd |
author_GND | (DE-588)1191381455 (DE-588)1191381773 |
author_facet | Bertram, Linda A. Dooble, Gunther van |
building | Verbundindex |
bvnumber | BV046065180 |
classification_rvk | ST 276 ST 205 SK 800 SR 200 AP 12600 |
ctrlnum | (OCoLC)1108912917 (DE-599)DNB1190111799 |
discipline | Allgemeines Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03005nam a2200685 c 4500</leader><controlfield tag="001">BV046065180</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230728 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">190725s2019 gw a||| ed|| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">19,N29</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1190111799</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783746066684</subfield><subfield code="c">Paperback : EUR 12.49 (DE), EUR 12.90 (AT), CHF 18.50 (freier Preis)</subfield><subfield code="9">978-3-7460-6668-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3746066689</subfield><subfield code="9">3-7460-6668-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783746066684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1108912917</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1190111799</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-SH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-525</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-37</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 205</subfield><subfield code="0">(DE-625)143613:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 800</subfield><subfield code="0">(DE-625)143256:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 200</subfield><subfield code="0">(DE-625)143355:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">AP 12600</subfield><subfield code="0">(DE-625)6865:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nomenclatura - Encyclopedia of modern cryptography and internet security</subfield><subfield code="b">from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys</subfield><subfield code="c">Linda A. Bertram, Gunther van Dooble et al. editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norderstedt</subfield><subfield code="b">BoD</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">410 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">21 cm x 14.8 cm, 595 g</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Encyclopaedia</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Dictionary</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4066724-8</subfield><subfield code="a">Wörterbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bertram, Linda A.</subfield><subfield code="0">(DE-588)1191381455</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dooble, Gunther van</subfield><subfield code="0">(DE-588)1191381773</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Books on Demand GmbH (Norderstedt)</subfield><subfield code="0">(DE-588)10068934-6</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=8ee76d92882045ddbbd274d55394c98a&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031446454&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031446454</subfield></datafield></record></collection> |
genre | (DE-588)4066724-8 Wörterbuch gnd-content |
genre_facet | Wörterbuch |
id | DE-604.BV046065180 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:34:17Z |
institution | BVB |
institution_GND | (DE-588)10068934-6 |
isbn | 9783746066684 3746066689 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031446454 |
oclc_num | 1108912917 |
open_access_boolean | |
owner | DE-860 DE-521 DE-B768 DE-634 DE-19 DE-BY-UBM DE-384 DE-12 DE-525 DE-29T DE-11 DE-20 DE-898 DE-BY-UBR DE-703 DE-83 DE-522 DE-37 DE-739 DE-M347 DE-355 DE-BY-UBR |
owner_facet | DE-860 DE-521 DE-B768 DE-634 DE-19 DE-BY-UBM DE-384 DE-12 DE-525 DE-29T DE-11 DE-20 DE-898 DE-BY-UBR DE-703 DE-83 DE-522 DE-37 DE-739 DE-M347 DE-355 DE-BY-UBR |
physical | 410 Seiten Illustrationen, Diagramme 21 cm x 14.8 cm, 595 g |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | BoD |
record_format | marc |
spelling | Nomenclatura - Encyclopedia of modern cryptography and internet security from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys Linda A. Bertram, Gunther van Dooble et al. editors Norderstedt BoD 2019 410 Seiten Illustrationen, Diagramme 21 cm x 14.8 cm, 595 g txt rdacontent n rdamedia nc rdacarrier Cryptography Encryption Data Security Encyclopaedia Dictionary Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf (DE-588)4066724-8 Wörterbuch gnd-content Kryptologie (DE-588)4033329-2 s Chiffrierung (DE-588)4352893-4 s Datensicherung (DE-588)4011144-1 s DE-604 Computersicherheit (DE-588)4274324-2 s Bertram, Linda A. (DE-588)1191381455 edt Dooble, Gunther van (DE-588)1191381773 edt Books on Demand GmbH (Norderstedt) (DE-588)10068934-6 pbl X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=8ee76d92882045ddbbd274d55394c98a&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031446454&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Nomenclatura - Encyclopedia of modern cryptography and internet security from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys Cryptography Encryption Data Security Encyclopaedia Dictionary Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4352893-4 (DE-588)4066724-8 |
title | Nomenclatura - Encyclopedia of modern cryptography and internet security from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys |
title_auth | Nomenclatura - Encyclopedia of modern cryptography and internet security from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys |
title_exact_search | Nomenclatura - Encyclopedia of modern cryptography and internet security from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys |
title_full | Nomenclatura - Encyclopedia of modern cryptography and internet security from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys Linda A. Bertram, Gunther van Dooble et al. editors |
title_fullStr | Nomenclatura - Encyclopedia of modern cryptography and internet security from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys Linda A. Bertram, Gunther van Dooble et al. editors |
title_full_unstemmed | Nomenclatura - Encyclopedia of modern cryptography and internet security from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys Linda A. Bertram, Gunther van Dooble et al. editors |
title_short | Nomenclatura - Encyclopedia of modern cryptography and internet security |
title_sort | nomenclatura encyclopedia of modern cryptography and internet security from autocrypt and exponential encryption to zero knowledge proof keys |
title_sub | from AutoCrypt and exponential encryption to Zero-Knowledge-Proof Keys |
topic | Cryptography Encryption Data Security Encyclopaedia Dictionary Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Cryptography Encryption Data Security Encyclopaedia Dictionary Kryptologie Computersicherheit Datensicherung Chiffrierung Wörterbuch |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=8ee76d92882045ddbbd274d55394c98a&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031446454&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bertramlindaa nomenclaturaencyclopediaofmoderncryptographyandinternetsecurityfromautocryptandexponentialencryptiontozeroknowledgeproofkeys AT dooblegunthervan nomenclaturaencyclopediaofmoderncryptographyandinternetsecurityfromautocryptandexponentialencryptiontozeroknowledgeproofkeys AT booksondemandgmbhnorderstedt nomenclaturaencyclopediaofmoderncryptographyandinternetsecurityfromautocryptandexponentialencryptiontozeroknowledgeproofkeys |