Publisher
Springer Fachmedien Wiesbaden
Reference32 articles.
1. Aftenposten: Sources: We were pressured to weaken the mobile security in the 1980s (2014). https://www.aftenposten.no/verden/i/Olkl/Sources-We-were-pressured-to-weaken-the-mobile-security-in-the-80s . Zugegriffen am 01.06.2018
2. AlFardan, N.J., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.N.: On the Security of RC4 in TLS. In: Proceedings of 22nd USENIX security symposium, Washington, S. 305–320. USENIX Association (2013)
3. Baranetsky, D.V.: Encryption and the press clause. NYU JIPEL 6(2) (2017). http://jipel.law.nyu.edu/vol-6-no-2-1-baranetsky/ . Zugegriffen am 01.06.2018
4. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Proceedings of Advances in Cryptology – Crypto ’96. LNCS Bd. 1109. Springer, Berlin (1996)
5. Beutelspacher, A., Neumann, H.B., Schwarzpaul, T.: Kryptografie in Theorie und Praxis, 2. Aufl. Vieweg+Teubner, Wiesbaden (2010)