Introduction to cryptography: principles and applications
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2007
|
Ausgabe: | 2. ed. |
Schriftenreihe: | Information security and cryptography
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVI, 367 S. |
ISBN: | 9783540492436 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV022375369 | ||
003 | DE-604 | ||
005 | 20191014 | ||
007 | t | ||
008 | 070402s2007 gw |||| 00||| eng d | ||
016 | 7 | |a 963094742 |2 DE-101 | |
020 | |a 9783540492436 |9 978-3-540-49243-6 | ||
035 | |a (OCoLC)123537432 | ||
035 | |a (DE-599)BVBBV022375369 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-92 |a DE-1051 |a DE-824 |a DE-20 |a DE-634 |a DE-11 |a DE-188 |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 |2 22 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Delfs, Hans |d 1949- |e Verfasser |0 (DE-588)132994895 |4 aut | |
245 | 1 | 0 | |a Introduction to cryptography |b principles and applications |c Hans Delfs ; Helmut Knebl |
250 | |a 2. ed. | ||
264 | 1 | |a Berlin [u.a.] |b Springer |c 2007 | |
300 | |a XVI, 367 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information security and cryptography | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 1 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
700 | 1 | |a Knebl, Helmut |e Verfasser |0 (DE-588)1192515382 |4 aut | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015584451&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015584451 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804136429648871424 |
---|---|
adam_text | DISCRETE MATHEMATICS AND ITS APPLICATIONS SERIES EDITOR KENNETH H. ROSEN
AN INTRODUCTION TO SECOND EDITION RICHARD A. MOLLIN *H CHAPMAN &
HALL/CRC TAYLOR & FRANCIS GROUP BOCA RATON LONDON NEW YORK CHAPMAN SC
HALL/CRC IS AN IMPRINT OF THE TAYLOR & FRANCIS CROUP, AN INFORMA
BUSINESS CONTENTS PREFACE IX 1 MATHEMATICAL BASICS 1 1.1 DIVISIBILITY 1
1.2 PRIMES, PRIMALITY TESTING, AND INDUCTION 6 1.3 AN INTRODUCTION TO
CONGRUENCES 17 1.4 EULER, FERMAT, AND WILSON 35 1.5 PRIMITIVE ROOTS 44
1.6 THE INDEX CALCULUS AND POWER RESIDUES 51 1.7 LEGENDRE, JACOBI, &;
QUADRATIC RECIPROCITY 58 1.8 COMPLEXITY 67 2 CRYPTOGRAPHIC BASICS 79 2.1
DEFINITIONS AND ILLUSTRATIONS 79 2.2 CLASSIC CIPHERS 91 2.3 STREAM
CIPHERS 109 2.4 LFSRS 115 2.5 MODES OF OPERATION 122 2.6 ATTACKS 127 3
DES AND AES 131 3.1 S-DES AND DES 131 3.2 AES . . 152 4 PUBLIC-KEY
CRYPTOGRAPHY 157 4.1 THE IDEAS BEHIND PKC 157 4.2 DIGITAL ENVELOPES AND
PKCS 165 4.3 RSA 172 4.4 ELGAMAL 181 4.5 DSA * THE DSS 187 5 PRIMALITY
TESTING 189 5.1 TRUE PRIMALITY TESTS 189 5.2 PROBABILISTIC PRIMALITY
TESTS 198 VII V1U 5.3 RECOGNIZING PRIMES 204 6 FACTORING 207 6.1
CLASSICAL FACTORIZATION METHODS 207 6.2 THE CONTINUED FRACTION ALGORITHM
211 6.3 POLLARD S ALGORITHMS 214 6.4 THE QUADRATIC SIEVE 217 6.5 THE
ELLIPTIC CURVE METHOD (ECM) 220 7 ELECTRONIC MAIL AND INTERNET SECURITY
223 7.1 HISTORY OF THE INTERNET AND THE WWW 223 7.2 PRETTY GOOD PRIVACY
(PGP) 227 7.3 PROTOCOL LAYERS AND SSL 241 7.4 INTERNETWORKING AND
SECURITY * FIREWALLS 250 7.5 CLIENT-SERVER MODEL AND COOKIES 259 8
LEADING-EDGE APPLICATIONS 263 8.1 LOGIN AND NETWORK SECURITY 263 8.2
VIRUSES AND OTHER INFECTIONS 273 8.3 SMART CARDS 286 8.4 BIOMETRICS 294
APPENDIX A: FUNDAMENTAL FACTS 298 APPENDIX B: COMPUTER ARITHMETIC 325
APPENDIX C: THE RIJNDAEL S-BOX 335 APPENDIX D: KNAPSACK CIPHERS 337
APPENDIX E: SILVER-POHLIG-HELLMAN ALGORITHM 344 APPENDIX F: SHA-1 346
APPENDIX G: RADIX-64 ENCODING 350 APPENDIX H: QUANTUM CRYPTOGRAPHY 352
SOLUTIONS TO ODD-NUMBERED EXERCISES 358 BIBLIOGRAPHY 377 LIST OF SYMBOLS
384 INDEX 384 ABOUT THE AUTHOR 413
|
adam_txt |
DISCRETE MATHEMATICS AND ITS APPLICATIONS SERIES EDITOR KENNETH H. ROSEN
AN INTRODUCTION TO SECOND EDITION RICHARD A. MOLLIN *H CHAPMAN &
HALL/CRC TAYLOR & FRANCIS GROUP BOCA RATON LONDON NEW YORK CHAPMAN SC
HALL/CRC IS AN IMPRINT OF THE TAYLOR & FRANCIS CROUP, AN INFORMA
BUSINESS CONTENTS PREFACE IX 1 MATHEMATICAL BASICS 1 1.1 DIVISIBILITY 1
1.2 PRIMES, PRIMALITY TESTING, AND INDUCTION 6 1.3 AN INTRODUCTION TO
CONGRUENCES 17 1.4 EULER, FERMAT, AND WILSON 35 1.5 PRIMITIVE ROOTS 44
1.6 THE INDEX CALCULUS AND POWER RESIDUES 51 1.7 LEGENDRE, JACOBI, &;
QUADRATIC RECIPROCITY 58 1.8 COMPLEXITY 67 2 CRYPTOGRAPHIC BASICS 79 2.1
DEFINITIONS AND ILLUSTRATIONS 79 2.2 CLASSIC CIPHERS 91 2.3 STREAM
CIPHERS 109 2.4 LFSRS 115 2.5 MODES OF OPERATION 122 2.6 ATTACKS 127 3
DES AND AES 131 3.1 S-DES AND DES ' 131 3.2 AES . . 152 4 PUBLIC-KEY
CRYPTOGRAPHY 157 4.1 THE IDEAS BEHIND PKC 157 4.2 DIGITAL ENVELOPES AND
PKCS 165 4.3 RSA 172 4.4 ELGAMAL 181 4.5 DSA * THE DSS 187 5 PRIMALITY
TESTING 189 5.1 TRUE PRIMALITY TESTS 189 5.2 PROBABILISTIC PRIMALITY
TESTS 198 VII V1U 5.3 RECOGNIZING PRIMES 204 6 FACTORING 207 6.1
CLASSICAL FACTORIZATION METHODS 207 6.2 THE CONTINUED FRACTION ALGORITHM
211 6.3 POLLARD'S ALGORITHMS 214 6.4 THE QUADRATIC SIEVE 217 6.5 THE
ELLIPTIC CURVE METHOD (ECM) 220 7 ELECTRONIC MAIL AND INTERNET SECURITY
223 7.1 HISTORY OF THE INTERNET AND THE WWW 223 7.2 PRETTY GOOD PRIVACY
(PGP) 227 7.3 PROTOCOL LAYERS AND SSL 241 7.4 INTERNETWORKING AND
SECURITY * FIREWALLS 250 7.5 CLIENT-SERVER MODEL AND COOKIES 259 8
LEADING-EDGE APPLICATIONS 263 8.1 LOGIN AND NETWORK SECURITY 263 8.2
VIRUSES AND OTHER INFECTIONS 273 8.3 SMART CARDS 286 8.4 BIOMETRICS 294
APPENDIX A: FUNDAMENTAL FACTS 298 APPENDIX B: COMPUTER ARITHMETIC 325
APPENDIX C: THE RIJNDAEL S-BOX 335 APPENDIX D: KNAPSACK CIPHERS 337
APPENDIX E: SILVER-POHLIG-HELLMAN ALGORITHM 344 APPENDIX F: SHA-1 346
APPENDIX G: RADIX-64 ENCODING 350 APPENDIX H: QUANTUM CRYPTOGRAPHY 352
SOLUTIONS TO ODD-NUMBERED EXERCISES 358 BIBLIOGRAPHY 377 LIST OF SYMBOLS
384 INDEX 384 ABOUT THE AUTHOR 413 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Delfs, Hans 1949- Knebl, Helmut |
author_GND | (DE-588)132994895 (DE-588)1192515382 |
author_facet | Delfs, Hans 1949- Knebl, Helmut |
author_role | aut aut |
author_sort | Delfs, Hans 1949- |
author_variant | h d hd h k hk |
building | Verbundindex |
bvnumber | BV022375369 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 273 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)123537432 (DE-599)BVBBV022375369 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02383nam a22006018c 4500</leader><controlfield tag="001">BV022375369</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191014 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070402s2007 gw |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">963094742</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540492436</subfield><subfield code="9">978-3-540-49243-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)123537432</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022375369</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Delfs, Hans</subfield><subfield code="d">1949-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132994895</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to cryptography</subfield><subfield code="b">principles and applications</subfield><subfield code="c">Hans Delfs ; Helmut Knebl</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 367 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security and cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Knebl, Helmut</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1192515382</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015584451&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015584451</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV022375369 |
illustrated | Not Illustrated |
index_date | 2024-07-02T17:08:59Z |
indexdate | 2024-07-09T20:56:16Z |
institution | BVB |
isbn | 9783540492436 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015584451 |
oclc_num | 123537432 |
open_access_boolean | |
owner | DE-92 DE-1051 DE-824 DE-20 DE-634 DE-11 DE-188 DE-355 DE-BY-UBR |
owner_facet | DE-92 DE-1051 DE-824 DE-20 DE-634 DE-11 DE-188 DE-355 DE-BY-UBR |
physical | XVI, 367 S. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Springer |
record_format | marc |
series2 | Information security and cryptography |
spelling | Delfs, Hans 1949- Verfasser (DE-588)132994895 aut Introduction to cryptography principles and applications Hans Delfs ; Helmut Knebl 2. ed. Berlin [u.a.] Springer 2007 XVI, 367 S. txt rdacontent n rdamedia nc rdacarrier Information security and cryptography Computer networks Security measures Computer security Cryptography Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 s DE-604 Kommunikationsprotokoll (DE-588)4128252-8 s Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s 1\p DE-604 Knebl, Helmut Verfasser (DE-588)1192515382 aut GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015584451&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Delfs, Hans 1949- Knebl, Helmut Introduction to cryptography principles and applications Computer networks Security measures Computer security Cryptography Public-Key-Kryptosystem (DE-588)4209133-0 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptologie (DE-588)4033329-2 gnd Kryptosystem (DE-588)4209132-9 gnd |
subject_GND | (DE-588)4209133-0 (DE-588)4128252-8 (DE-588)4709127-7 (DE-588)4033329-2 (DE-588)4209132-9 |
title | Introduction to cryptography principles and applications |
title_auth | Introduction to cryptography principles and applications |
title_exact_search | Introduction to cryptography principles and applications |
title_exact_search_txtP | Introduction to cryptography principles and applications |
title_full | Introduction to cryptography principles and applications Hans Delfs ; Helmut Knebl |
title_fullStr | Introduction to cryptography principles and applications Hans Delfs ; Helmut Knebl |
title_full_unstemmed | Introduction to cryptography principles and applications Hans Delfs ; Helmut Knebl |
title_short | Introduction to cryptography |
title_sort | introduction to cryptography principles and applications |
title_sub | principles and applications |
topic | Computer networks Security measures Computer security Cryptography Public-Key-Kryptosystem (DE-588)4209133-0 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptologie (DE-588)4033329-2 gnd Kryptosystem (DE-588)4209132-9 gnd |
topic_facet | Computer networks Security measures Computer security Cryptography Public-Key-Kryptosystem Kommunikationsprotokoll Sicherheitsprotokoll Kryptologie Kryptosystem |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015584451&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT delfshans introductiontocryptographyprinciplesandapplications AT kneblhelmut introductiontocryptographyprinciplesandapplications |