Skip to Content
IT-Sicherheit, 10th Edition
book

IT-Sicherheit, 10th Edition

by Claudia Eckert
August 2018
Intermediate to advanced
1021 pages
32h
German
De Gruyter Oldenbourg
Content preview from IT-Sicherheit, 10th Edition

Literaturverzeichnis

[1]3GPP. Design of the UMTS Cipher and Integrity Functions.

[2]3GPP. UMTS Security Architecture.

[3]Martín Abadi and Roger M. Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1):6–15, jan 1996.

[4]R. Anderson. Stretching the limits of steganography. Lecture Notes in Computer Science, 1174:39–48, 1996.

[5]Ross Anderson. Security Engineering. John Wiley, 2001.

[6]Ross Anderson and Markus Kuhn. Tamper Resistance – a Cautionary Note. In Second USENIXWorkshop on Electronic Commerce, pages 1–11, Oakland, California, 1996.

[7]Michael Arnold, Martin Schmucker, and Stephen D. Wolthusen. Techniques and Applications of Digital Watermarking and Content Protection. Artech-House, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

IT-Sicherheit, 9th Edition

IT-Sicherheit, 9th Edition

Claudia Eckert
Wirtschaftsinformatik, 12th Edition

Wirtschaftsinformatik, 12th Edition

Hans Robert Hansen, Jan Mendling, Gustaf Neumann

Publisher Resources

ISBN: 9783110584684