Literaturverzeichnis

[1]3GPP. Design of the UMTS Cipher and Integrity Functions.

[2]3GPP. UMTS Security Architecture.

[3]Martín Abadi and Roger M. Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1):6–15, jan 1996.

[4]R. Anderson. Stretching the limits of steganography. Lecture Notes in Computer Science, 1174:39–48, 1996.

[5]Ross Anderson. Security Engineering. John Wiley, 2001.

[6]Ross Anderson and Markus Kuhn. Tamper Resistance – a Cautionary Note. In Second USENIXWorkshop on Electronic Commerce, pages 1–11, Oakland, California, 1996.

[7]Michael Arnold, Martin Schmucker, and Stephen D. Wolthusen. Techniques and Applications of Digital Watermarking and Content Protection. Artech-House, ...

Get IT-Sicherheit, 10th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.