Beyond cryptographic routing: the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Schlagworte: | |
Beschreibung: | 227 Seiten Illustrationen |
ISBN: | 9783748151982 3748151985 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045466287 | ||
003 | DE-604 | ||
005 | 20190401 | ||
007 | t | ||
008 | 190215s2018 a||| |||| 00||| eng d | ||
015 | |a 18,N45 |2 dnb | ||
016 | 7 | |a 117042175X |2 DE-101 | |
020 | |a 9783748151982 |c Print |9 978-3-7481-5198-2 | ||
020 | |a 3748151985 |c Print |9 3-7481-5198-5 | ||
035 | |a (OCoLC)1062311570 | ||
035 | |a (DE-599)DNB117042175X | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-188 |a DE-473 |a DE-703 | ||
082 | 0 | |a 004 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ZN 6025 |0 (DE-625)157494: |2 rvk | ||
100 | 1 | |a Gasakis, Mele |e Verfasser |4 aut | |
245 | 1 | 0 | |a Beyond cryptographic routing |b the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol |c Mele Gasakis & Max Schmidt |
264 | 0 | |a Norderstedt |b Books on Demand |c [2018] | |
300 | |a 227 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Schmidt, Max |e Verfasser |4 aut | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030851483 |
Datensatz im Suchindex
_version_ | 1804179381780742144 |
---|---|
any_adam_object | |
author | Gasakis, Mele Schmidt, Max |
author_facet | Gasakis, Mele Schmidt, Max |
author_role | aut aut |
author_sort | Gasakis, Mele |
author_variant | m g mg m s ms |
building | Verbundindex |
bvnumber | BV045466287 |
classification_rvk | ST 276 ZN 6025 |
ctrlnum | (OCoLC)1062311570 (DE-599)DNB117042175X |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01938nam a2200421 c 4500</leader><controlfield tag="001">BV045466287</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190401 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">190215s2018 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">18,N45</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">117042175X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783748151982</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-7481-5198-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3748151985</subfield><subfield code="c">Print</subfield><subfield code="9">3-7481-5198-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1062311570</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB117042175X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6025</subfield><subfield code="0">(DE-625)157494:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gasakis, Mele</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Beyond cryptographic routing</subfield><subfield code="b">the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol</subfield><subfield code="c">Mele Gasakis & Max Schmidt</subfield></datafield><datafield tag="264" ind1=" " ind2="0"><subfield code="a">Norderstedt</subfield><subfield code="b">Books on Demand</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">227 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schmidt, Max</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030851483</subfield></datafield></record></collection> |
id | DE-604.BV045466287 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:18:48Z |
institution | BVB |
isbn | 9783748151982 3748151985 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030851483 |
oclc_num | 1062311570 |
open_access_boolean | |
owner | DE-12 DE-188 DE-473 DE-BY-UBG DE-703 |
owner_facet | DE-12 DE-188 DE-473 DE-BY-UBG DE-703 |
physical | 227 Seiten Illustrationen |
publishDateSearch | 2018 |
publishDateSort | 2018 |
record_format | marc |
spelling | Gasakis, Mele Verfasser aut Beyond cryptographic routing the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol Mele Gasakis & Max Schmidt Norderstedt Books on Demand [2018] 227 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Chiffrierung (DE-588)4352893-4 s Kryptologie (DE-588)4033329-2 s Kommunikationsprotokoll (DE-588)4128252-8 s DE-604 Schmidt, Max Verfasser aut |
spellingShingle | Gasakis, Mele Schmidt, Max Beyond cryptographic routing the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol Kommunikationsprotokoll (DE-588)4128252-8 gnd Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4128252-8 (DE-588)4352893-4 (DE-588)4033329-2 |
title | Beyond cryptographic routing the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol |
title_auth | Beyond cryptographic routing the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol |
title_exact_search | Beyond cryptographic routing the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol |
title_full | Beyond cryptographic routing the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol Mele Gasakis & Max Schmidt |
title_fullStr | Beyond cryptographic routing the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol Mele Gasakis & Max Schmidt |
title_full_unstemmed | Beyond cryptographic routing the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol Mele Gasakis & Max Schmidt |
title_short | Beyond cryptographic routing |
title_sort | beyond cryptographic routing the echo protocol in the new era of exponential encryption eee a comprehensive essay about the sprinkling effect of cryptographic echo discovery secred and further innovations in cryptography around the echo applications smoke smokestack spot on lettera and goldbug crypto chat messenger addressing encryption graph theory routing and the change from mix networks like tor or i2p to peer to peer flooding networks like the echo respective to friend to friend trust networks like they are built over the poptastic protocol |
title_sub | the echo protocol in the new era of exponential encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to peer-to-peer-flooding-networks like the Echo respective to friend-to-friend trust-networks like they are built over the POPTASTIC protocol |
topic | Kommunikationsprotokoll (DE-588)4128252-8 gnd Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kommunikationsprotokoll Chiffrierung Kryptologie |
work_keys_str_mv | AT gasakismele beyondcryptographicroutingtheechoprotocolintheneweraofexponentialencryptioneeeacomprehensiveessayaboutthesprinklingeffectofcryptographicechodiscoverysecredandfurtherinnovationsincryptographyaroundtheechoapplicationssmokesmokestackspotonletteraandgoldbugcr AT schmidtmax beyondcryptographicroutingtheechoprotocolintheneweraofexponentialencryptioneeeacomprehensiveessayaboutthesprinklingeffectofcryptographicechodiscoverysecredandfurtherinnovationsincryptographyaroundtheechoapplicationssmokesmokestackspotonletteraandgoldbugcr |