Beth, T.: Sichere offene Datennetze (1995)
0.01
0.0105722025 = product of:
0.063433215 = sum of:
0.012143499 = weight(_text_:und in 1180) [ClassicSimilarity], result of:
0.012143499 = score(doc=1180,freq=2.0), product of:
0.049590345 = queryWeight, product of:
2.216367 = idf(docFreq=13101, maxDocs=44218)
0.02237461 = queryNorm
0.24487628 = fieldWeight in 1180, product of:
1.4142135 = tf(freq=2.0), with freq of:
2.0 = termFreq=2.0
2.216367 = idf(docFreq=13101, maxDocs=44218)
0.078125 = fieldNorm(doc=1180)
0.026811302 = weight(_text_:des in 1180) [ClassicSimilarity], result of:
0.026811302 = score(doc=1180,freq=4.0), product of:
0.061962176 = queryWeight, product of:
2.7693076 = idf(docFreq=7536, maxDocs=44218)
0.02237461 = queryNorm
0.43270433 = fieldWeight in 1180, product of:
2.0 = tf(freq=4.0), with freq of:
4.0 = termFreq=4.0
2.7693076 = idf(docFreq=7536, maxDocs=44218)
0.078125 = fieldNorm(doc=1180)
0.012334915 = weight(_text_:der in 1180) [ClassicSimilarity], result of:
0.012334915 = score(doc=1180,freq=2.0), product of:
0.04997966 = queryWeight, product of:
2.2337668 = idf(docFreq=12875, maxDocs=44218)
0.02237461 = queryNorm
0.2467987 = fieldWeight in 1180, product of:
1.4142135 = tf(freq=2.0), with freq of:
2.0 = termFreq=2.0
2.2337668 = idf(docFreq=12875, maxDocs=44218)
0.078125 = fieldNorm(doc=1180)
0.012143499 = weight(_text_:und in 1180) [ClassicSimilarity], result of:
0.012143499 = score(doc=1180,freq=2.0), product of:
0.049590345 = queryWeight, product of:
2.216367 = idf(docFreq=13101, maxDocs=44218)
0.02237461 = queryNorm
0.24487628 = fieldWeight in 1180, product of:
1.4142135 = tf(freq=2.0), with freq of:
2.0 = termFreq=2.0
2.216367 = idf(docFreq=13101, maxDocs=44218)
0.078125 = fieldNorm(doc=1180)
0.16666667 = coord(4/24)
- Abstract
- Mathematische Techniken ermöglichen, Daten zuverlässig und vertraulich über unsicher Kanäle zu senden. Zugleich gewinnen die Beteiligten Gewißheit über die Identität des Partners oder Vertrauen zu einem bislang Unbekannten. Eine allwissende, allzeit bereite Zentrale ist nicht erforderlich
- Content
- Berichtet auch über Aktivitäten des Europäischen Instituts für Systemsicherheit (EISS)
- Source
- Spektrum der Wissenschaft. 1995, H.5, S.46-55