![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/hmd/hmd190.bht:"
@article{DBLP:journals/hmd/HartrothK96, author = {J{\"{o}}rn Hartroth and Dietmar A. Kottmann}, title = {Mobile Softwareagenten: Entwicklungsstand und Einsatzperspektiven}, journal = {{HMD} Prax. Wirtsch.}, volume = {190}, year = {1996}, url = {http://hmd.dpunkt.de/190/07.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/HartrothK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/Heuser96, author = {Ansgar Heuser}, title = {Kryptographie: der Schl{\"{u}}ssel zu mehr Datensicherheit in der Informationstechnik}, journal = {{HMD} Prax. Wirtsch.}, volume = {190}, year = {1996}, url = {http://hmd.dpunkt.de/190/01.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/Heuser96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/Kiefer96, author = {Erich Kiefer}, title = {Informationssicherung: Verfahren zur Nutzungskontrolle von EDV-Ressourcen, Kryptographie, Chipkarten}, journal = {{HMD} Prax. Wirtsch.}, volume = {190}, year = {1996}, url = {http://hmd.dpunkt.de/190/04.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/Kiefer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/KlasenR96, author = {Wolfgang Klasen and Ute Rosenbaum}, title = {Informationssicherheit in IT-Anwendungen}, journal = {{HMD} Prax. Wirtsch.}, volume = {190}, year = {1996}, url = {http://hmd.dpunkt.de/190/02.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/KlasenR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/Kowalski96, author = {Bernd Kowalski}, title = {Telesec{\textregistered} - Verfahren zur Telesicherheit der Deutschen Telekom {AG}}, journal = {{HMD} Prax. Wirtsch.}, volume = {190}, year = {1996}, url = {http://hmd.dpunkt.de/190/06.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/Kowalski96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/Munzenberger96, author = {Meinhard M{\"{u}}nzenberger}, title = {Public-Key-Kryptosysteme}, journal = {{HMD} Prax. Wirtsch.}, volume = {190}, year = {1996}, url = {http://hmd.dpunkt.de/190/03.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/Munzenberger96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/SchaumburgI96, author = {Heike Schaumburg and Ludwig J. Issing}, title = {Lernen mit Hypermedia: Verloren im Hyperraum?}, journal = {{HMD} Prax. Wirtsch.}, volume = {190}, year = {1996}, url = {http://hmd.dpunkt.de/190/08.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/SchaumburgI96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hmd/Stollenmayer96, author = {Peter Stollenmayer}, title = {Sicherheitsdienste und Mechanismen in der Telekommunikation}, journal = {{HMD} Prax. Wirtsch.}, volume = {190}, year = {1996}, url = {http://hmd.dpunkt.de/190/05.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hmd/Stollenmayer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.