It looks like you're offline.
Open Library logo
additional options menu
Last edited by RenameBot
August 23, 2008 | History

Patrick Horster

We need a photo of Patrick Horster

22 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Trust Center

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Systemsicherheit: Grundlagen, Konzepte, Realisierungen, Anwendungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Chipkarten: Grundlagen, Realisierung, Sicherheitsaspekte, Anwendungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Communications and Multimedia Security II

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Approximative public-key-kryptosysteme

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Communications and Multimedia Security II (IFIP International Federation for Information Processing)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Das Kryptosystem von Lu und Lee: ein Public-Key-Kryptosystem, Attacken und Modifikationen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Das Kryptosystem von McEliece: ein Public-Key-Kryptosystem auf der Basis von Goppa-Codes

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Kommunikationssicherheit im Zeichen des Internet. Grundlagen, Strategien, Realisierungen, Anwendungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Kryptologie
    First published in 1985 1 edition in 1 language

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Systemsicherheit. Grundlagen, Konzepte, Realisierungen, Anwendungen.

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Angewandte Mathematik, insbesondere Informatik: Beispiele erfolgreicher Wege zwischen Mathematik und Informatik

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Sicherheitsinfrastrukturen: "Grundlagen, Realisierungen, Rechtliche Aspekte, Anwendungen"

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Kommunikationssicherheit im Zeichen des Internet: Grundlagen, Strategien, Realisierungen, Anwendungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Systemsicherheit: Grundlagen, Konzepte, Realisierungen, Anwendungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Chipkarten: Grundlagen, Realisierung, Sicherheitsaspekte, Anwendungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Angewandte Mathematik, insbesondere Informatik: Beispiele erfolgreicher Wege zwischen Mathematik und Informatik

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Sicherheitsinfrastrukturen: Grundlagen, Realisierungen, Rechtliche Aspekte, Anwendungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Kommunikationssicherheit im Zeichen des Internet: Grundlagen, Strategien, Realisierungen, Anwendungen

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Approximative Public-Key-Kryptosysteme
    First published in 1989 1 edition in 1 language — 1 previewable

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
August 23, 2008 Edited by RenameBot fix author name
April 1, 2008 Created by an anonymous user initial import