Showing 1 - 20 results of 25 for search 'Horster, Patrick', query time: 0.09s
Refine Results
In addition to media from the THWS, media from other Bavarian libraries are also displayed.
These are marked with the "Interlibrary loan" label and can be ordered by clicking on them.
These are marked with the "Interlibrary loan" label and can be ordered by clicking on them.
-
1
Das Kryptosystem von Lu und Lee ein Public-Key-Kryptosystem, Attacken und Modifikationen by Horster, Patrick, Schade, Marion
Published 1989Call Number: Loading…
Located: Loading…Book Loading… -
2
RISC reduced instruction set computer ; Konzepte u. Realisierungen by Horster, Patrick, Manstetten, Dietrich, Pelzer, Heidrun
Published 1987Call Number: Loading…
Located: Loading…Book Loading… -
3
Chipkarten Grundlagen, Realisierung, Sicherheitsaspekte, Anwendungen by Horster, Patrick 1948-
Published 1998Call Number: Loading…Get full text
Located: Loading…
-
4
Meta-Message recovery and meta-blind signature schemes and their applications by Horster, Patrick, Michels, Markus, Petersen, Holger
Published 1995Call Number: Loading…
Located: Loading… -
5
Das Kryptosystem von McEliece ein Public-Key-Kryptosystem auf der Basis von Goppa-Codes by Horster, Patrick, Sperling, Reinhard
Published 1990Call Number: Loading…
Located: Loading… -
6
Approximative Public-Key-Kryptosysteme by Horster, Patrick, Isselhorst, Hartmut
Published 1989Call Number: Loading…
Located: Loading… -
7
-
8
Reduktionssysteme, formale Sprachen und Automatentheorie by Horster, Patrick
Published 1983Call Number: Loading…
Located: Loading… -
9
Reduktionssysteme, formale Sprachen und Automatentheorie by Horster, Patrick
Published 1983Call Number: Loading…
Located: Loading… -
10
Kryptologie e. Anwendung d. Zahlentheorie u. Komplexitätstheorie by Horster, Patrick
Published 1982Call Number: Loading…
Located: Loading… -
11
Kryptologie, eine Anwendung der Zahlentheorie und Komplexitätstheorie by Horster, Patrick
Published 1982Call Number: Loading…
Located: Loading… -
12
Sicherheitsinfrastrukturen Grundlagen, Realisierungen, Rechtliche Aspekte, Anwendungen by Horster, Patrick 1948-
Published 1999Call Number: Loading…Get full text
Located: Loading…
-
13
Standards und Patente zur IT-Sicherheit by Fumy, Walter 19XX-, Horster, Patrick 1948-, Kraaibeek, Peter 19XX-
Published 1995Call Number: Loading…Indexes
Located: Loading…
-
14
Trust Center Grundlagen, rechtliche Aspekte, Standardisierung und Realisierung by Horster, Patrick 1948-
Published 1995Call Number: Loading…Get full text
Located: Loading…
-
15
Signatur- und Authentifikationsverfahren auf der Basis des diskreten Logarithmusproblems by Horster, Patrick, Petersen, Holger
Published 1994Call Number: Loading…Indexes
Located: Loading…
-
16
-
17
Zertifikate und Konzepte selbstzertifizierender Schlüssel by Horster, Patrick, Michels, Markus, Petersen, Holger
Published 1995Call Number: Loading…
Located: Loading… -
18
Approximative Public-Key-Kryptosysteme by Horster, Patrick
Published 1989Call Number: Loading…
Located: Loading…
Get full textLoading…Get full text
-
19
Der FEAL-Algorithmus, fast data Encryption algorithm by Horster, Patrick
Published 1986Call Number: Loading…
Located: Loading… -
20
Das RISC-Konzept by Horster, Patrick, Manstetten, Dietrich, Pelzer, Heidrun
Published 1986Call Number: Loading…
Located: Loading…