Skip to contents

  1. Gasakis, Mele [Author]; Schmidt, Max [Author] ; Books on Demand GmbH Norderstedt

    Beyond cryptographic routing : the Echo Protocol in the new Era of Exponential Encryption (EEE) : a comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, graph-theory, routing and the change from mix-networks like Tor or I2P to Peer-to-Peer-Flooding-Networks like the Echo respective to Friend-to-Friend Trust-Networks like they are built over the POPTASTIC protocol

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Norderstedt: BoD - Books on Demand, 2018

  2. Pieprzyk, Josef [Author]; Hardjono, Thomas [Author]; Seberry, Jennifer [Author]

    Fundamentals of computer security

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Berlin; Heidelberg [u.a.]: Springer, 2003

  3. Stallings, William [Author]

    Sicherheit im Datennetz

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    München [u.a.]: Prentice Hall, 1995