Public key cryptography:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Deutsch |
Veröffentlicht: |
Berlin; Heidelberg; New York; Barcelona; Budapest; Hong Kong; London; Milán; París; Santa Clara; Singapur; Tokio
Springer
1996
|
Ausgabe: | Second, enlarged edition |
Schriftenreihe: | Texts in theoretical computer science
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | X, 271 Seiten Ill. |
ISBN: | 3540613560 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV010896979 | ||
003 | DE-604 | ||
005 | 20240616 | ||
007 | t| | ||
008 | 960805s1996 gw a||| |||| 00||| ger d | ||
010 | |a 96031537 | ||
020 | |a 3540613560 |c Pp. : DM 68.00 |9 3-540-61356-0 | ||
035 | |a (OCoLC)833014413 | ||
035 | |a (DE-599)BVBBV010896979 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a ger | |
044 | |a gw |c DE | ||
049 | |a DE-29T |a DE-384 |a DE-20 |a DE-739 |a DE-91 |a DE-91G |a DE-703 |a DE-M347 |a DE-355 |a DE-92 |a DE-19 |a DE-1046 |a DE-M158 |a DE-526 |a DE-83 |a DE-11 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 |2 20 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Salomaa, Arto |d 1934- |e Verfasser |0 (DE-588)121031764 |4 aut | |
245 | 1 | 0 | |a Public key cryptography |c Arto Salomaa |
246 | 1 | 3 | |a Public-key cryptography |
250 | |a Second, enlarged edition | ||
264 | 1 | |a Berlin; Heidelberg; New York; Barcelona; Budapest; Hong Kong; London; Milán; París; Santa Clara; Singapur; Tokio |b Springer |c 1996 | |
300 | |a X, 271 Seiten |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Texts in theoretical computer science | |
650 | 7 | |a Computabilidade e modelos de computacao |2 larpcal | |
650 | 4 | |a Cryptographie | |
650 | 7 | |a Geheimschrift |2 gtt | |
650 | 4 | |a Ordinateurs - Accès - Contrôle | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Public key cryptography | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computer |0 (DE-588)4070083-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computer |0 (DE-588)4070083-5 |D s |
689 | 1 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | 1 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 2 | |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-007287771 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0001 98 A 10 0102 DAT 465f 2001 A 29236(2) |
---|---|
DE-BY-TUM_katkey | 783671 |
DE-BY-TUM_location | Mag 01 |
DE-BY-TUM_media_number | 040003942570 040020483774 040020376025 |
_version_ | 1821938903345528833 |
adam_text | ARTO SALOMAA PUBLIC-KEY CRYPTOGRAPHY SECOND, ENLARGED EDITION WITH 22
FIGURES SPRINGER CONTENTS CHAPTER 1. CLASSICAL TWO-WAY CRYPTOGRAPHY 1
1.1 CRYPTOSYSTEMS AND CRYPTANALYSIS 1 1.2 MONOALPHABETIC SYSTEMS 10 1.3
POLYALPHABETIC AND OTHER SYSTEMS 22 1.4 ROTORS AND DES 39 CHAPTER 2. THE
IDEA OF PUBLIC KEYS 55 2.1 SOME STREETS ARE ONE-WAY 55 2.2 HOW TO
REALIZE THE IDEA 64 2.3 OBVIOUS ADVANTAGES OF PUBLIC KEYS 71 CHAPTER 3.
KNAPSACK SYSTEMS 77 3.1 A TRAPDOOR IS BUILT 77 3.2 HOW TO FIND THE
TRAPDOOR 87 3.3 THEORY OF REACHABILITY 96 3.4 TRYING TO HIDE THE
TRAPDOOR AGAIN 108 3.5 DENSE KNAPSACKS 117 CHAPTER 4. RSA 125 4.1 LEGAL
WORLD 125 4.2 ATTACK AND DEFENSE 134 4.3 PRIMALITY 137 4.4 CRYPTANALYSIS
AND FACTORING 143 4.5 PARTIAL INFORMATION ON RSA 147 4.6 DISCRETE
LOGARITHMS AND KEY EXCHANGE 154 CHAPTER 5. OTHER BASES OF CRYPTOSYSTEMS
159 5.1 EXPONENTIATION IN QUADRATIC FIELDS 159 5.2 ITERATION OF
MORPHISMS 166 5.3 AUTOMATA AND LANGUAGE THEORY 174 5.4 CODING THEORY .
178 CHAPTER 6. CRYPTOGRAPHIC PROTOCOLS: SURPRISING VISTAS FOR
COMMUNICATION 18 1 6.1 MORE THAN ETIQUETTE 181 6.2 COIN FLIPPING BY
TELEPHONE. POKER REVISITED 184 6.3 HOW TO SHARE A SECRET 187 6.4 PARTIAL
DISCLOSURE OF SECRETS 190 6.5 OBLIVIOUS TRANSFER 194 6.6 APPLICATIONS:
BANKING AND BALLOTS 200 7 X CONTENTS 6.7 CONVINCING PROOFS WITH NO
DETAILS 202 6.8 ZERO-KNOWLEDGE PROOFS 208 6.9 ZERO-KNOWLEDGE PROOFS OF
IDENTITY 213 6.10 SECRET BALLOTING SYSTEMS REVISITED 218 6.11
CRYPTOGRAPHIC PROTOCOLS WITHOUT COMPUTERS 234 APPENDIX A. TUTORIAL IN
COMPLEXITY THEORY 245 APPENDIX B. TUTORIAL IN NUMBER THEORY 249 PROBLEMS
255 HISTORICAL AND BIBLIOGRAPHICAL REMARKS 263 REFERENCES 265 INDEX 269
ARTO SALOMAA PUBLIC-KEY CRYPTOGRAPHY SECOND, ENLARGED EDITION WITH 22
FIGURES SPRINGER CONTENTS CHAPTER 1. CLASSICAL TWO-WAY CRYPTOGRAPHY 1
1.1 CRYPTOSYSTEMS AND CRYPTANALYSIS 1 1.2 MONOALPHABETIC SYSTEMS 10 1.3
POLYALPHABETIC AND OTHER SYSTEMS 22 1.4 ROTORS AND DES 39 CHAPTER 2. THE
IDEA OF PUBLIC KEYS 55 2.1 SOME STREETS ARE ONE-WAY 55 2.2 HOW TO
REALIZE THE IDEA 64 2.3 OBVIOUS ADVANTAGES OF PUBLIC KEYS 71 CHAPTER 3.
KNAPSACK SYSTEMS 77 3.1 A TRAPDOOR IS BUILT 77 3.2 HOW TO FIND THE
TRAPDOOR 87 3.3 THEORY OF REACHABILITY 96 3.4 TRYING TO HIDE THE
TRAPDOOR AGAIN 108 3.5 DENSE KNAPSACKS 117 CHAPTER 4. RSA 125 4.1 LEGAL
WORLD 125 4.2 ATTACK AND DEFENSE 134 4.3 PRIMALITY 137 4.4 CRYPTANALYSIS
AND FACTORING 143 4.5 PARTIAL INFORMATION ON RSA 147 4.6 DISCRETE
LOGARITHMS AND KEY EXCHANGE 154 CHAPTER 5. OTHER BASES OF CRYPTOSYSTEMS
159 5.1 EXPONENTIATION IN QUADRATIC FIELDS 159 5.2 ITERATION OF
MORPHISMS 166 5.3 AUTOMATA AND LANGUAGE THEORY 174 5.4 CODING THEORY .
178 CHAPTER 6. CRYPTOGRAPHIC PROTOCOLS: SURPRISING VISTAS FOR
COMMUNICATION 18 1 6.1 MORE THAN ETIQUETTE 181 6.2 COIN FLIPPING BY
TELEPHONE. POKER REVISITED 184 6.3 HOW TO SHARE A SECRET 187 6.4 PARTIAL
DISCLOSURE OF SECRETS 190 6.5 OBLIVIOUS TRANSFER 194 6.6 APPLICATIONS:
BANKING AND BALLOTS 200 7 X CONTENTS 6.7 CONVINCING PROOFS WITH NO
DETAILS 202 6.8 ZERO-KNOWLEDGE PROOFS 208 6.9 ZERO-KNOWLEDGE PROOFS OF
IDENTITY 213 6.10 SECRET BALLOTING SYSTEMS REVISITED 218 6.11
CRYPTOGRAPHIC PROTOCOLS WITHOUT COMPUTERS 234 APPENDIX A. TUTORIAL IN
COMPLEXITY THEORY 245 APPENDIX B. TUTORIAL IN NUMBER THEORY 249 PROBLEMS
255 HISTORICAL AND BIBLIOGRAPHICAL REMARKS 263 REFERENCES 265 INDEX 269
|
any_adam_object | 1 |
author | Salomaa, Arto 1934- |
author_GND | (DE-588)121031764 |
author_facet | Salomaa, Arto 1934- |
author_role | aut |
author_sort | Salomaa, Arto 1934- |
author_variant | a s as |
building | Verbundindex |
bvnumber | BV010896979 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 273 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)833014413 (DE-599)BVBBV010896979 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | Second, enlarged edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02782nam a2200637 c 4500</leader><controlfield tag="001">BV010896979</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240616 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">960805s1996 gw a||| |||| 00||| ger d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">96031537</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540613560</subfield><subfield code="c">Pp. : DM 68.00</subfield><subfield code="9">3-540-61356-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)833014413</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV010896979</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-M158</subfield><subfield code="a">DE-526</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Salomaa, Arto</subfield><subfield code="d">1934-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)121031764</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Public key cryptography</subfield><subfield code="c">Arto Salomaa</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Public-key cryptography</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second, enlarged edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin; Heidelberg; New York; Barcelona; Budapest; Hong Kong; London; Milán; París; Santa Clara; Singapur; Tokio</subfield><subfield code="b">Springer</subfield><subfield code="c">1996</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 271 Seiten</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Texts in theoretical computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computabilidade e modelos de computacao</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007287771</subfield></datafield></record></collection> |
id | DE-604.BV010896979 |
illustrated | Illustrated |
indexdate | 2024-12-20T10:02:46Z |
institution | BVB |
isbn | 3540613560 |
language | German |
lccn | 96031537 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007287771 |
oclc_num | 833014413 |
open_access_boolean | |
owner | DE-29T DE-384 DE-20 DE-739 DE-91 DE-BY-TUM DE-91G DE-BY-TUM DE-703 DE-M347 DE-355 DE-BY-UBR DE-92 DE-19 DE-BY-UBM DE-1046 DE-M158 DE-526 DE-83 DE-11 DE-706 |
owner_facet | DE-29T DE-384 DE-20 DE-739 DE-91 DE-BY-TUM DE-91G DE-BY-TUM DE-703 DE-M347 DE-355 DE-BY-UBR DE-92 DE-19 DE-BY-UBM DE-1046 DE-M158 DE-526 DE-83 DE-11 DE-706 |
physical | X, 271 Seiten Ill. |
publishDate | 1996 |
publishDateSearch | 1996 |
publishDateSort | 1996 |
publisher | Springer |
record_format | marc |
series2 | Texts in theoretical computer science |
spellingShingle | Salomaa, Arto 1934- Public key cryptography Computabilidade e modelos de computacao larpcal Cryptographie Geheimschrift gtt Ordinateurs - Accès - Contrôle Computers Access control Public key cryptography Kryptologie (DE-588)4033329-2 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Software (DE-588)4055382-6 gnd Computer (DE-588)4070083-5 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4293034-0 (DE-588)4209133-0 (DE-588)4055382-6 (DE-588)4070083-5 |
title | Public key cryptography |
title_alt | Public-key cryptography |
title_auth | Public key cryptography |
title_exact_search | Public key cryptography |
title_full | Public key cryptography Arto Salomaa |
title_fullStr | Public key cryptography Arto Salomaa |
title_full_unstemmed | Public key cryptography Arto Salomaa |
title_short | Public key cryptography |
title_sort | public key cryptography |
topic | Computabilidade e modelos de computacao larpcal Cryptographie Geheimschrift gtt Ordinateurs - Accès - Contrôle Computers Access control Public key cryptography Kryptologie (DE-588)4033329-2 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Software (DE-588)4055382-6 gnd Computer (DE-588)4070083-5 gnd |
topic_facet | Computabilidade e modelos de computacao Cryptographie Geheimschrift Ordinateurs - Accès - Contrôle Computers Access control Public key cryptography Kryptologie Zugriffskontrolle Public-Key-Kryptosystem Software Computer |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007287771&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT salomaaarto publickeycryptography |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Bibliotheksmagazin
Signatur: |
0001 98 A 10 Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 465f 2001 A 29236(2) Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |
Exemplar 2 | Ausleihbar Am Standort |