Search Results - Schwenk, Jörg
- Results 1 – 20 of 26
- Go to Next Page
-
1Sicherheit und Kryptographie im Internet: von sicherer E-Mail bis zu IP-VerschlüsselungPublished 2010Call Number: Loading…Table of Contents
Located: Loading…Book Loading… -
2Guide to internet cryptography: security protocols and Real-World attack implicationsPublished 2022Call Number: Loading…Fulltext
Located: Loading…Electronic eBook Loading… -
3Moderne Verfahren der Kryptographie: von RSA zu Zero-Knowledge und darüber hinausPublished 2022Call Number: Loading…Fulltext
Located: Loading…Electronic eBook Loading… -
4Sicherheit und Kryptographie im Internet: Theorie und PraxisPublished 2020Call Number: Loading…Fulltext
Located: Loading…Electronic eBook Loading… -
5Moderne Verfahren der Kryptographie: von RSA zu Zero-KnowledgePublished 2015Call Number: Loading…Fulltext
Located: Loading…Electronic eBook Loading… -
6Sicherheit und Kryptographie im Internet: Theorie und PraxisPublished 2014Call Number: Loading…Fulltext
Located: Loading…Electronic eBook Loading… -
7Moderne Verfahren der Kryptographie: von RSA zu Zero-KnowledgePublished 2001Call Number: Loading…
Located: Loading…Book Loading… -
8Sicherheit und Kryptographie im Internet: von sicherer E-Mail bis zu IP-VerschlüsselungPublished 2010Call Number: Loading…Fulltext
Located: Loading…Electronic eBook Loading… -
9Moderne Verfahren der Kryptographie: von RSA zu Zero-KnowledgePublished 2006Call Number: Loading…
Located: Loading…Book Loading… -
10Moderne Verfahren der Kryptographie: von RSA zu Zero-KnowledgePublished 2006Call Number: Loading…Fulltext
Located: Loading…Electronic eBook Loading… -
11Sicherheit und Kryptographie im Internet: von sicherer E-Mail bis zu IP-VerschlüsselungPublished 2005Call Number: Loading…Table of Contents
Located: Loading…Available at UBR Items can be borrowed from the UBR with a personal library card.Book Loading… -
12Moderne Verfahren der Kryptographie: Von RSA zu Zero-KnowledgePublished 2004Call Number: Loading…
Located: Loading…Available at UBR Items can be borrowed from the UBR with a personal library card.Book Loading… -
13Moderne Verfahren der Kryptographie: von RSA zu Zero-KnowledgePublished 1995Call Number: Loading…
Located: Loading…Available at UBR Items can be borrowed from the UBR with a personal library card.Book Loading… -
14Moderne Verfahren der Kryptographie: von RSA zu Zero-KnowledgePublished 2010Call Number: Loading…
Located: Loading…Available at UBR Items can be borrowed from the UBR with a personal library card.Book Loading… -
15Sicherheit und Kryptographie im Internet: von sicherer E-Mail bis zu IP-VerschlüsselungPublished 2002Call Number: Loading…Table of Contents
Located: Loading…Available at UBR Items can be borrowed from the UBR with a personal library card.Book Loading… -
16Erweiterte TripelsystemePublished 1993Call Number: Loading…Table of Contents
Located: Loading…Available at UBR Items can be borrowed from the UBR with a personal library card.Thesis Book Loading… -
17Sicherheit und Kryptographie im Internet: Theorie und PraxisPublished 2020Call Number: Loading…Table of Contents
Located: Loading…Book Loading… -
18Sicherheit und Kryptographie im Internet: Von sicherer E-Mail bis zu IP-VerschlüsselungPublished 2002Call Number: Loading…
Located: Loading…Electronic eBook Loading… -
19Modern Cryptography: From RSA to Zero-Knowledge and BeyondPublished 2025Call Number: Loading…
Located: Loading…Book Loading… -
20Moderne Verfahren der Kryptographie: von RSA zu Zero-Knowledge und darüber hinausPublished 2022Call Number: Loading…Table of Contents
Located: Loading…Book Loading…