Literaturverzeichnis
[1]3GPP. Design of the UMTS Cipher and Integrity Functions.
[2]3GPP. UMTS Security Architecture.
[3]Martín Abadi and Roger M. Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1):6–15, jan 1996.
[4]A.V. Aho, R. Sethi, and J.D. Ullman. Compilers: principles, techniques, tools. Addison-Wesley, 1986.
[5]R. Anderson. Stretching the limits of steganography. Lecture Notes in Computer Science, 1174:39–48, 1996.
[6]Ross Anderson. Security Engineering. John Wiley, 2001.
[7]Ross Anderson and Markus Kuhn. Tamper Resistance – a Cautionary Note. In Second USENIXWorkshop on Electronic Commerce, pages 1–11, Oakland, California, 1996.
[8]Ken Arnold and James Gosling. The Java ...
Get IT-Sicherheit, 9th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.