Die Zukunft der Kryptographie. Jager, T. Datenschutz und Datensicherheit, 38(7):445–451, 2014. Paper doi bibtex @article{DBLP:journals/dud/Jager14,
author = {Tibor Jager},
title = {Die Zukunft der Kryptographie},
journal = {Datenschutz und Datensicherheit},
volume = {38},
number = {7},
pages = {445--451},
year = {2014},
url = {https://doi.org/10.1007/s11623-014-0204-8},
doi = {10.1007/s11623-014-0204-8},
timestamp = {Sat, 27 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/dud/Jager14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"qnsrM7rggoZS3nSFW","bibbaseid":"jager-diezukunftderkryptographie-2014","downloads":0,"creationDate":"2017-02-15T09:30:53.198Z","title":"Die Zukunft der Kryptographie","author_short":["Jager, T."],"year":2014,"bibtype":"article","biburl":"https://dblp.org/pid/53/1548.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Tibor"],"propositions":[],"lastnames":["Jager"],"suffixes":[]}],"title":"Die Zukunft der Kryptographie","journal":"Datenschutz und Datensicherheit","volume":"38","number":"7","pages":"445–451","year":"2014","url":"https://doi.org/10.1007/s11623-014-0204-8","doi":"10.1007/s11623-014-0204-8","timestamp":"Sat, 27 May 2017 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/dud/Jager14","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/dud/Jager14,\n author = {Tibor Jager},\n title = {Die Zukunft der Kryptographie},\n journal = {Datenschutz und Datensicherheit},\n volume = {38},\n number = {7},\n pages = {445--451},\n year = {2014},\n url = {https://doi.org/10.1007/s11623-014-0204-8},\n doi = {10.1007/s11623-014-0204-8},\n timestamp = {Sat, 27 May 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/dud/Jager14},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Jager, T."],"key":"DBLP:journals/dud/Jager14","id":"DBLP:journals/dud/Jager14","bibbaseid":"jager-diezukunftderkryptographie-2014","role":"author","urls":{"Paper":"https://doi.org/10.1007/s11623-014-0204-8"},"downloads":0},"search_terms":["die","zukunft","der","kryptographie","jager"],"keywords":[],"authorIDs":[],"dataSources":["daSCQD6mQ2J9P67ha"]}