{"title":"Transport Layer Security","authors":"Jorg Schwenk","doi":"10.1007/978-3-658-29260-7_10","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_10","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kerberos","authors":"Jörg Schwenk","doi":"10.1007/978-3-658-29260-7_14","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_14","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116910241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Datenverschlüsselung: PGP","authors":"Jörg Schwenk","doi":"10.1007/978-3-658-29260-7_16","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_16","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Drahtlose Netzwerke (WLAN)","authors":"Jörg Schwenk","doi":"10.1007/978-3-658-06544-7_3","DOIUrl":"https://doi.org/10.1007/978-3-658-06544-7_3","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kryptographie: Vertraulichkeit","authors":"Jörg Schwenk","doi":"10.1007/978-3-658-29260-7_2","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_2","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132146744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Point-to-Point-Sicherheit","authors":"Jörg Schwenk","doi":"10.1007/978-3-658-29260-7_5","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_5","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125582766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kryptographische Protokolle","authors":"Jörg Schwenk","doi":"10.1007/978-3-658-29260-7_4","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_4","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131563326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Das Internet","authors":"Jörg Schwenk","doi":"10.1007/978-3-658-29260-7_1","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_1","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"63 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114116498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IP-Sicherheit (IPsec)","authors":"Jörg Schwenk","doi":"10.1007/978-3-658-29260-7_8","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_8","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Shell (SSH)","authors":"Jorg Schwenk","doi":"10.1007/978-3-658-29260-7_13","DOIUrl":"https://doi.org/10.1007/978-3-658-29260-7_13","url":null,"abstract":"","PeriodicalId":386720,"journal":{"name":"Sicherheit und Kryptographie im Internet","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131133947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}