Literaturverzeichnis
[1]3GPP. Design of the UMTS Cipher and Integrity Functions.
[2]3GPP. UMTS Security Architecture.
[3]Martín Abadi and Roger M. Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering, 22(1):6–15, jan 1996.
[4]R. Anderson. Stretching the limits of steganography. Lecture Notes in Computer Science, 1174:39–48, 1996.
[5]Ross Anderson. Security Engineering. John Wiley, 2001.
[6]Ross Anderson and Markus Kuhn. Tamper Resistance – a Cautionary Note. In Second USENIXWorkshop on Electronic Commerce, pages 1–11, Oakland, California, 1996.
[7]Michael Arnold, Martin Schmucker, and Stephen D. Wolthusen. Techniques and Applications of Digital Watermarking and Content Protection. Artech-House, ...
Get IT-Sicherheit, 10th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.