(2008) Key-Substitution-Angriffe und das Signaturgesetz.
Datenschutz und Datensicherheit, 32 (6).
pp. 388-392.
Full text not available from this repository.
Item Type: | Article |
---|---|
Additional Information: | pub_id: 907 Bibtex: bohlisorge08signaturen URL date: None |
Depositing User: | Sebastian Weisgerber |
Date Deposited: | 26 Jul 2017 10:30 |
Last Modified: | 27 Jul 2017 07:05 |
URI: | https://publications.cispa.saarland/id/eprint/543 |
Actions
Actions (login required)
View Item |