Literaturverzeichnis

[1]3GPP. Design of the UMTS Cipher and Integrity Functions.

[2]3GPP. UMTS Security Architecture.

[3]Martín Abadi and Roger M. Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1):6–15, jan 1996.

[4]A.V. Aho, R. Sethi, and J.D. Ullman. Compilers: principles, techniques, tools. Addison-Wesley, 1986.

[5]R. Anderson. Stretching the limits of steganography. Lecture Notes in Computer Science, 1174:39–48, 1996.

[6]Ross Anderson. Security Engineering. John Wiley, 2001.

[7]Ross Anderson and Markus Kuhn. Tamper Resistance – a Cautionary Note. In Second USENIXWorkshop on Electronic Commerce, pages 1–11, Oakland, California, 1996.

[8]Ken Arnold and James Gosling. The Java ...

Get IT-Sicherheit, 9th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.