<--- Back to Details
First PageDocument Content
Members of the Hanseatic League / Metropolitan areas of Germany / Geography of Germany / Economic development / Dortmund / Oil Campaign of World War II / Ruhr / Industrialisation / Essen / Economics / Geography of Europe
Date: 2013-09-11 12:29:17
Members of the Hanseatic League
Metropolitan areas of Germany
Geography of Germany
Economic development
Dortmund
Oil Campaign of World War II
Ruhr
Industrialisation
Essen
Economics
Geography of Europe

NIF_Visual_00_NIF_DINA1_01RZ

Add to Reading List

Source URL: www.hmkv.de

Download Document from Source Website

File Size: 1,96 MB

Share Document on Facebook

Similar Documents

Algebra / Linear algebra / Mathematics / Numerical linear algebra / Matrices / Matrix theory / Multiplication / Gaussian elimination / Matrix multiplication / Pivot element / Invertible matrix / Matrix

SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

DocID: 1xVrH - View Document

Cryptography / Radio electronics / Block ciphers / KeeLoq / Rolling code / Data Encryption Standard / ICE

Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

DocID: 1xVdf - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document

Global Positioning System / Avionics / Finance / Economy / Money / Computer network security / Spoofing attack / Navigation / FLARM / Automatic dependent surveillance  broadcast / GPS navigation device / GPS signals

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen∗ , Matthias Sch¨afer† , Daniel Moser‡ , Vincent Lenders§ , Christina P¨opper¶ and Jens Schmitt† ∗ Ruhr-Universi

DocID: 1xT7s - View Document

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

DocID: 1xT6f - View Document