dc.contributor.author |
Huber, Michael |
|
dc.date.accessioned |
2014-03-20T14:56:59Z |
|
dc.date.available |
2014-03-20T14:56:59Z |
|
dc.date.issued |
2012 |
|
dc.identifier.issn |
1615-5262 |
|
dc.identifier.uri |
http://hdl.handle.net/10900/50312 |
|
dc.language.iso |
en |
de_DE |
dc.publisher |
Springer |
de_DE |
dc.relation.uri |
http://dx.doi.org/10.1007/s10207-012-0166-5 |
de_DE |
dc.rights |
info:eu-repo/semantics/closedAccess |
|
dc.subject.ddc |
004 |
de_DE |
dc.title |
Perfect secrecy systems immune to spoofing attacks |
de_DE |
dc.type |
Article |
de_DE |
utue.quellen.id |
20140226071329_01636 |
de_DE |
utue.publikation.seiten |
281-289 |
de_DE |
utue.personen.roh |
Huber, Michael |
|
dcterms.isPartOf.ZSTitelID |
International Journal of Information Security |
de_DE |
dcterms.isPartOf.ZS-Issue |
SI |
de_DE |
dcterms.isPartOf.ZS-Volume |
11 |
de_DE |
utue.fakultaet |
07 Mathematisch-Naturwissenschaftliche Fakultät |
de_DE |