1
0
mirror of https://github.com/2martens/uni.git synced 2026-05-06 19:36:26 +02:00

SemFrieden: Zitiersystem geändert auf biblatex

This commit is contained in:
Jim Martens
2014-11-22 17:08:34 +01:00
parent 0f59450c35
commit 064333efda
2 changed files with 73 additions and 73 deletions

View File

@ -5,9 +5,12 @@
\usepackage[utf8]{inputenc} % Unicode funktioniert unter Windows, Linux und Mac \usepackage[utf8]{inputenc} % Unicode funktioniert unter Windows, Linux und Mac
\usepackage[T1]{fontenc} \usepackage[T1]{fontenc}
\usepackage[ngerman]{babel} \usepackage[ngerman]{babel}
\usepackage[numbers]{natbib} \usepackage{csquotes}
\usepackage[fixlanguage]{babelbib} \usepackage[
\selectbiblanguage{ngerman} backend=biber,
bibstyle=ieee,
citestyle=ieee
]{biblatex}
%\usepackage{ngerman} %\usepackage{ngerman}
\usepackage{graphicx} \usepackage{graphicx}
\usepackage[hidelinks]{hyperref}\urlstyle{rm} \usepackage[hidelinks]{hyperref}\urlstyle{rm}
@ -20,6 +23,7 @@
\setlength{\parindent}{0em} \setlength{\parindent}{0em}
\setlength{\parskip}{1.2ex plus 0.5ex minus 0.5ex} \setlength{\parskip}{1.2ex plus 0.5ex minus 0.5ex}
\pagestyle{plain} \pagestyle{plain}
\addbibresource{semFrieden.bib}
\begin{document} \begin{document}
@ -65,8 +69,7 @@ Studiengang BSc. Informatik
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\newpage \newpage
\bibliography{semFrieden} \printbibliography
\bibliographystyle{plainnat}
\addcontentsline{toc}{section}{Literaturverzeichnis} \addcontentsline{toc}{section}{Literaturverzeichnis}

View File

@ -2,20 +2,20 @@
% Encoding: UTF8 % Encoding: UTF8
@InProceedings{Alshamsi2005, @Inproceedings{Alshamsi2005,
Title = {A Technical Comparison of IPSec and SSL}, Title = {A Technical Comparison of IPSec and SSL},
Author = {Alshamsi, AbdelNasir and Saito, Takamichi}, Author = {Alshamsi, AbdelNasir and Saito, Takamichi},
Booktitle = {Proceedings. 19th International Conference on Advanced Information Networking and Applications}, Booktitle = {Proceedings. 19th International Conference on Advanced Information Networking and Applications},
Year = {2005}, Year = {2005},
Doi = {10.1109/AINA.2005.70},
Month = {Mar}, Month = {Mar},
Pages = {395--398}, Pages = {395--398},
Doi = {10.1109/AINA.2005.70},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }
@InProceedings{Brin1998, @Inproceedings{Brin1998,
Title = {The Anatomy of a Large-Scale Hypertextual Web Search Engine}, Title = {The Anatomy of a Large-Scale Hypertextual Web Search Engine},
Author = {Brin, Sergey and Page, Lawrence}, Author = {Brin, Sergey and Page, Lawrence},
Booktitle = {Seventh World Wide Web Conference}, Booktitle = {Seventh World Wide Web Conference},
@ -44,15 +44,15 @@
@Article{Chou2002, @Article{Chou2002,
Title = {Inside {SSL}: {The} {Secure} {Sockets} {Layer} {Protocol}}, Title = {Inside {SSL}: {The} {Secure} {Sockets} {Layer} {Protocol}},
Author = {Chou, Wesley}, Author = {Chou, Wesley},
Journal = {IT Professional}, Journaltitle = {IT Professional},
Year = {2002}, Year = {2002},
Doi = {10.1109/MITP.2002.1046644},
Month = {Jul/Aug}, Month = {Jul/Aug},
Number = {4}, Number = {4},
Pages = {47--52}, Pages = {47--52},
Volume = {4}, Volume = {4},
Doi = {10.1109/MITP.2002.1046644}, Journal = {IT Professional},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }
@ -69,42 +69,41 @@
Timestamp = {2013.10.29} Timestamp = {2013.10.29}
} }
@Standard{Dierks2008, @Report{Dierks2008,
Title = {The Transport Layer Security (TLS) Protocol}, Title = {The Transport Layer Security (TLS) Protocol},
Institution = {IETF},
Organization = {RTMF},
Author = {Dierks, T. and Rescorla, E.}, Author = {Dierks, T. and Rescorla, E.},
Language = {English}, Institution = {IETF},
Type = {RFC},
Year = {2008}, Year = {2008},
Language = {English},
Organization = {RTMF},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }
@InProceedings{Duffield1999, @Inproceedings{Duffield1999,
Title = {A Flexible Model for Resource Management in Virtual Private Network}, Title = {A Flexible Model for Resource Management in Virtual Private Network},
Author = {Duffield, N. G. and Goyal, Pawan and Greenberg, Albert and Mishra, Partho and Ramakrishnan, K. K. and van der Merive, Jacobus E.}, Author = {Duffield, N. G. and Goyal, Pawan and Greenberg, Albert and Mishra, Partho and Ramakrishnan, K. K. and van der Merive, Jacobus E.},
Booktitle = {Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication}, Booktitle = {Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication},
Year = {1999}, Year = {1999},
Address = {New York, NY, USA},
Pages = {95--108},
Publisher = {ACM},
Series = {SIGCOMM '99},
Acmid = {316209},
Doi = {10.1145/316188.316209}, Doi = {10.1145/316188.316209},
ISBN = {1-58113-135-6}, ISBN = {1-58113-135-6},
Location = {Cambridge, Massachusetts, USA}, Location = {Cambridge, Massachusetts, USA},
Pages = {95--108},
Publisher = {ACM},
Series = {SIGCOMM '99},
Url = {http://doi.acm.org/10.1145/316188.316209},
Acmid = {316209},
Address = {New York, NY, USA},
Numpages = {14}, Numpages = {14},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.18}, Timestamp = {2014.10.18}
Url = {http://doi.acm.org/10.1145/316188.316209}
} }
@Misc{Ferguson, @Misc{Ferguson,
Title = {A Cryptographic Evaluation of IPsec}, Title = {A Cryptographic Evaluation of IPsec},
Author = {Ferguson, Niels and Schneider, Bruce}, Author = {Ferguson, Niels and Schneider, Bruce},
Owner = {jim}, Owner = {jim},
@ -114,46 +113,39 @@
@Article{Fraenkel1968, @Article{Fraenkel1968,
Title = {Idee und {R}ealität des {V}ölkerbundes im deutschen politischen {D}enken}, Title = {Idee und {R}ealität des {V}ölkerbundes im deutschen politischen {D}enken},
Author = {Fraenkel, Ernst}, Author = {Fraenkel, Ernst},
Journal = {Vierteljahrshefte für Zeitgeschichte}, Journaltitle = {Vierteljahrshefte für Zeitgeschichte},
Year = {1968}, Year = {1968},
Month = {Jan}, Month = {Jan},
Number = {1}, Number = {1},
Pages = {1--14}, Pages = {1--14},
Volume = {16}, Volume = {16},
Journal = {Vierteljahrshefte für Zeitgeschichte},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.26} Timestamp = {2014.10.26}
} }
@Standard{Freier2011, @Report{Freier2011,
Title = {The Secure Sockets Layer (SSL) Protocol Version 3.0}, Title = {The Secure Sockets Layer (SSL) Protocol Version 3.0},
Institution = {IETF},
Author = {Freier, A. and Karlton, P. and Kocher, P.}, Author = {Freier, A. and Karlton, P. and Kocher, P.},
Language = {English}, Institution = {IETF},
Type = {RFC},
Year = {2011}, Year = {2011},
Language = {English},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }
@InCollection{Gasser1991, @Incollection{Gasser1991,
Title = {Das humanitäre {V}ölkerrecht}, Title = {Das humanitäre {V}ölkerrecht},
Author = {Gasser, Hans-Peter}, Author = {Gasser, Hans-Peter},
Booktitle = {Menschlichkeit für alle}, Booktitle = {Menschlichkeit für alle},
Publisher = {Hans-Haug},
Year = {1991}, Year = {1991},
Pages = {1--13}, Pages = {1--13},
Publisher = {Hans-Haug},
Abstract = {Gasser erläutert die Entwicklung des humanitären Völkerrechts. Das humanitäre Völkerrecht versucht die Leiden und Schrecken des Krieges zu minimieren, heißt Krieg aber in keinem Falle gut. Abstract = {Gasser erläutert die Entwicklung des humanitären Völkerrechts. Das humanitäre Völkerrecht versucht die Leiden und Schrecken des Krieges zu minimieren, heißt Krieg aber in keinem Falle gut. Es gab mehrere Ursprünge des Rechts und es kann kein "Erfinder" benannt werden. Mit der zunehmenden Kodifizierung des Rechts in dem 19. Jahrhundert wurde auch begonnen das humanitäre Völkerrecht zu etablieren. Essentiell dafür war das Haager Abkommen über die Gebräuche und Gesetze des Landkriegs (beinhaltet Haager Landkriegsordnung) von 1899 und 1907. Ebenso war das erste Genfer Abkommen 1864 zentral. Beide Abkommen haben sich rechtlich auf eigener Bahn entwickelt, bis sie nach dem vernichtenden 2. Weltkrieg 1949 zusammengebracht wurden. Zentrale Auffassung des Rechts ist, dass der einzige Zweck des Krieges die Kampfunfähigkeit der gegnerischen Truppen sein darf. Alle Menschen, die nicht aktiv an Kampfhandlungen teilnehmen, sind zu schützen. Nur militärische Ziele dürfen angegriffen werden. Die Neutralität der Lazarette und ihres Personals ist unbedingt sicherzustellen. Jeder darf Verwundeten helfen, gleich auf welcher Seite sie stehen. ... Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
Es gab mehrere Ursprünge des Rechts und es kann kein "Erfinder" benannt werden. Mit der zunehmenden Kodifizierung des Rechts in dem 19. Jahrhundert wurde auch begonnen das humanitäre Völkerrecht zu etablieren. Essentiell dafür war das Haager Abkommen über die Gebräuche und Gesetze des Landkriegs (beinhaltet Haager Landkriegsordnung) von 1899 und 1907. Ebenso war das erste Genfer Abkommen 1864 zentral. Beide Abkommen haben sich rechtlich auf eigener Bahn entwickelt, bis sie nach dem vernichtenden 2. Weltkrieg 1949 zusammengebracht wurden.
Zentrale Auffassung des Rechts ist, dass der einzige Zweck des Krieges die Kampfunfähigkeit der gegnerischen Truppen sein darf. Alle Menschen, die nicht aktiv an Kampfhandlungen teilnehmen, sind zu schützen. Nur militärische Ziele dürfen angegriffen werden. Die Neutralität der Lazarette und ihres Personals ist unbedingt sicherzustellen.
Jeder darf Verwundeten helfen, gleich auf welcher Seite sie stehen. ...
Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.26} Timestamp = {2014.10.26}
} }
@ -173,13 +165,14 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
@Article{Gong2013, @Article{Gong2013,
Title = {Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication}, Title = {Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication},
Author = {Gong, Li-Hua and Liu, Ye and Zhou, Nan-Run}, Author = {Gong, Li-Hua and Liu, Ye and Zhou, Nan-Run},
Journal = {International Journal of Theoretical Physics}, Journaltitle = {International Journal of Theoretical Physics},
Year = {2013}, Year = {2013},
Number = {9}, Number = {9},
Pages = {3260--3268}, Pages = {3260--3268},
Volume = {52}, Volume = {52},
Abstract = {Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.}, Abstract = {Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.},
Journal = {International Journal of Theoretical Physics},
Owner = {jim}, Owner = {jim},
Publisher = {Springer}, Publisher = {Springer},
Timestamp = {2014.10.18} Timestamp = {2014.10.18}
@ -188,29 +181,31 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
@Article{Heffter1951, @Article{Heffter1951,
Title = {Vom {P}rimat der {A}ussenpolitik}, Title = {Vom {P}rimat der {A}ussenpolitik},
Author = {Heffter, Heinrich}, Author = {Heffter, Heinrich},
Journal = {Historische Zeitschrift}, Journaltitle = {Historische Zeitschrift},
Year = {1951}, Year = {1951},
Number = {1}, Number = {1},
Pages = {1--20}, Pages = {1--20},
Volume = {171}, Volume = {171},
Journal = {Historische Zeitschrift},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.26} Timestamp = {2014.10.26}
} }
@MastersThesis{Heinzel2003, @Thesis{Heinzel2003,
Title = {Virtual Private Networks}, Title = {Virtual Private Networks},
Author = {Heinzel, Marcus and Michaelsen, Nils and Scheibe, Alexander}, Author = {Heinzel, Marcus and Michaelsen, Nils and Scheibe, Alexander},
School = {Fachbereich Informatik, Universität Hamburg}, Institution = {Fachbereich Informatik, Universität Hamburg},
Type = {Seminar paper},
Year = {2003}, Year = {2003},
Month = {Jan}, Month = {Jan},
Type = {Seminar paper},
Owner = {jim}, Owner = {jim},
School = {Fachbereich Informatik, Universität Hamburg},
Timestamp = {2014.10.18} Timestamp = {2014.10.18}
} }
@TechReport{Hosner2004, @Techreport{Hosner2004,
Title = {{IPsec} and the {SSL} {VPN} {Revolution}}, Title = {{IPsec} and the {SSL} {VPN} {Revolution}},
Author = {Hosner, Charlie}, Author = {Hosner, Charlie},
Institution = {SANS Institute}, Institution = {SANS Institute},
@ -220,48 +215,49 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }
@InBook{Jurafsky2009, @Inbook{Jurafsky2009,
Title = {Speech and Language Processing}, Title = {Speech and Language Processing},
Author = {Jurafsky, Daniel and Martin, James H.}, Author = {Jurafsky, Daniel and Martin, James H.},
Booktitle = {Speech and Language Processing},
Year = {2009},
Chapter = {18}, Chapter = {18},
Edition = {Second},
Pages = {617--644}, Pages = {617--644},
Publisher = {Pearson}, Publisher = {Pearson},
Year = {2009},
Edition = {Second},
Series = {Prentice-Hall series in artificial intelligence}, Series = {Prentice-Hall series in artificial intelligence},
Abstract = {Sentences get their meanings from the words they contain and the syntactic order of the words. Therefore the meaning of a sentence is partially based on the words and its syntactic structure. The composition of meaning representation is guided by the syntactic components and relations provided by grammars such as CFGs. A meaning representation is generated by first sending the input through a parser which results in the syntactic analysis and second passing this analysis as input to a semantic analyzer. In the syntax-driven semantic analysis it is assumed that syntactic, lexical and anaphoric ambiguities are not a problem. The semantic meanings are attached to the grammar rules and lexical entries from which trees are generated in the first place. This is called rule-to-rule hypothesis. The semantic attachments are written in braces after the syntactic rules themselves. After the syntactic analysis has been created, every word receives a FOL predicate and/or term. The semantic analyzer goes the tree up until the complete FOL term has been created. On the way lambda reduction is used to replace predicates and terms with their proper meanings, received from other parts of the tree.}, Abstract = {Sentences get their meanings from the words they contain and the syntactic order of the words. Therefore the meaning of a sentence is partially based on the words and its syntactic structure. The composition of meaning representation is guided by the syntactic components and relations provided by grammars such as CFGs. A meaning representation is generated by first sending the input through a parser which results in the syntactic analysis and second passing this analysis as input to a semantic analyzer. In the syntax-driven semantic analysis it is assumed that syntactic, lexical and anaphoric ambiguities are not a problem. The semantic meanings are attached to the grammar rules and lexical entries from which trees are generated in the first place. This is called rule-to-rule hypothesis. The semantic attachments are written in braces after the syntactic rules themselves. After the syntactic analysis has been created, every word receives a FOL predicate and/or term. The semantic analyzer goes the tree up until the complete FOL term has been created. On the way lambda reduction is used to replace predicates and terms with their proper meanings, received from other parts of the tree.},
Booktitle = {Speech and Language Processing},
Owner = {jim}, Owner = {jim},
Quality = {1}, Quality = {1},
Timestamp = {2013.11.16} Timestamp = {2013.11.16}
} }
@InBook{Jurafsky2009a, @Inbook{Jurafsky2009a,
Title = {Speech and Language Processing}, Title = {Speech and Language Processing},
Author = {Jurafsky, Daniel and Martin, James H.}, Author = {Jurafsky, Daniel and Martin, James H.},
Booktitle = {Speech and Language Processing},
Year = {2009},
Chapter = {17p}, Chapter = {17p},
Edition = {2},
Pages = {579--616}, Pages = {579--616},
Publisher = {Pearson}, Publisher = {Pearson},
Year = {2009},
Edition = {Second},
Series = {Prentice-Hall series in artificial intelligence}, Series = {Prentice-Hall series in artificial intelligence},
Abstract = {Lambda notation is used to bind variables dynamically to later appearing contents. lambda x P(x)(y) results in P(y) after a lambda reduction as x has been bound to y. lambda P P(x)(lambda x Restaurant(x)) results in lambda x Restaurant(x)(x) which results in Restaurant(x)}, Abstract = {Lambda notation is used to bind variables dynamically to later appearing contents. lambda x P(x)(y) results in P(y) after a lambda reduction as x has been bound to y. lambda P P(x)(lambda x Restaurant(x)) results in lambda x Restaurant(x)(x) which results in Restaurant(x)},
Booktitle = {Speech and Language Processing},
Owner = {jim}, Owner = {jim},
Quality = {1}, Quality = {1},
Timestamp = {2013.11.16} Timestamp = {2013.11.16}
} }
@InBook{Jurafsky2009b, @Inbook{Jurafsky2009b,
Title = {Speech and Language Processing}, Title = {Speech and Language Processing},
Author = {Jurafsky, Daniel and Martin, James H.}, Author = {Jurafsky, Daniel and Martin, James H.},
Booktitle = {Speech and Language Processing},
Year = {2009},
Chapter = {13}, Chapter = {13},
Edition = {2},
Pages = {461--492}, Pages = {461--492},
Publisher = {Pearson}, Publisher = {Pearson},
Year = {2009},
Edition = {Second},
Series = {Prentice-Hall series in artificial intelligence}, Series = {Prentice-Hall series in artificial intelligence},
Owner = {jim}, Owner = {jim},
@ -269,14 +265,15 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
Timestamp = {2013.11.17} Timestamp = {2013.11.17}
} }
@Standard{Kent2005, @Report{Kent2005,
Title = {Security {Architecture} for the {Internet} {Protocol}}, Title = {Security {Architecture} for the {Internet} {Protocol}},
Institution = {IETF},
Organization = {BBN Technologies},
Author = {Kent, S. and Seo, K.}, Author = {Kent, S. and Seo, K.},
Language = {English}, Institution = {IETF},
Type = {RFC},
Year = {2005}, Year = {2005},
Language = {English},
Organization = {BBN Technologies},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.24} Timestamp = {2014.10.24}
} }
@ -317,17 +314,18 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
@Article{Lingen2014, @Article{Lingen2014,
Title = {Mit dem {K}rieg seinen {F}rieden machen}, Title = {Mit dem {K}rieg seinen {F}rieden machen},
Author = {von Lingen, Kerstin}, Author = {von Lingen, Kerstin},
Journal = {Ruperto Carola}, Journaltitle = {Ruperto Carola},
Year = {2014}, Year = {2014},
Number = {4}, Number = {4},
Pages = {59--65}, Pages = {59--65},
Abstract = {Um die Gräueltaten des Zweiten Weltkrieges zu sühnen, fanden in Europa und Asien nach 1945 mehrere Tausend Kriegsverbrecherprozesse statt. Nicht selten jedoch waren die Verfahren weniger dem Streben nach Gerechtigkeit als politischen Interessen gezollt. Das zeigt sich vor allem an ostasiatischen Kriegsverbrecherprozessen im Kontext von Dekolonisierung und Kaltem Krieg. Heidelberger Historiker erforschen die Wechselwirkungen zwischen Asien und Europa im Rahmen der Prozesse und analysieren die weitreichenden Folgen der ambivalenten Rechtsprechungen.}, Abstract = {Um die Gräueltaten des Zweiten Weltkrieges zu sühnen, fanden in Europa und Asien nach 1945 mehrere Tausend Kriegsverbrecherprozesse statt. Nicht selten jedoch waren die Verfahren weniger dem Streben nach Gerechtigkeit als politischen Interessen gezollt. Das zeigt sich vor allem an ostasiatischen Kriegsverbrecherprozessen im Kontext von Dekolonisierung und Kaltem Krieg. Heidelberger Historiker erforschen die Wechselwirkungen zwischen Asien und Europa im Rahmen der Prozesse und analysieren die weitreichenden Folgen der ambivalenten Rechtsprechungen.},
Journal = {Ruperto Carola},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.26} Timestamp = {2014.10.26}
} }
@TechReport{Paskin2001, @Techreport{Paskin2001,
Title = {Cubic-time Parsing and Learning Algorithms for Grammatical Bigram Models}, Title = {Cubic-time Parsing and Learning Algorithms for Grammatical Bigram Models},
Author = {Paskin, Mark A.}, Author = {Paskin, Mark A.},
Institution = {University of California}, Institution = {University of California},
@ -341,12 +339,12 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
Timestamp = {2013.10.29} Timestamp = {2013.10.29}
} }
@InCollection{Paterson2006, @Incollection{Paterson2006,
Title = {A {Cryptographic} {Tour} of the {IPsec} {Standards}}, Title = {A {Cryptographic} {Tour} of the {IPsec} {Standards}},
Author = {Paterson, Kenneth G.}, Author = {Paterson, Kenneth G.},
Booktitle = {Information security technical report}, Booktitle = {Information security technical report},
Publisher = {Elsevier},
Year = {2006}, Year = {2006},
Publisher = {Elsevier},
Journal = {information security technical report}, Journal = {information security technical report},
Keywords = {IP, IPsec, network security, cryptography, key management}, Keywords = {IP, IPsec, network security, cryptography, key management},
@ -356,12 +354,11 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
@Misc{Portalarium2013, @Misc{Portalarium2013,
Title = {Shroud of the {Avatar} {Six Month Progress Video}}, Title = {Shroud of the {Avatar} {Six Month Progress Video}},
Author = {Portalarium}, Author = {Portalarium},
Year = {2013},
HowPublished = {\url{https://www.youtube.com/watch?v=yGa6hR4a87U}}, HowPublished = {\url{https://www.youtube.com/watch?v=yGa6hR4a87U}},
Month = {November}, Month = {November},
Note = {Accessed on 18.01.2014 12:07}, Note = {Accessed on 18.01.2014 12:07},
Year = {2013},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.01.12} Timestamp = {2014.01.12}
@ -411,10 +408,10 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
Title = {Dependency Parsing by Belief Propagation}, Title = {Dependency Parsing by Belief Propagation},
Author = {Smith, David A. and Eisner, Jason}, Author = {Smith, David A. and Eisner, Jason},
Booktitle = {Conference on Empirical Methods in Natural Language Processing}, Booktitle = {Conference on Empirical Methods in Natural Language Processing},
Date = {October 25 - October 27},
Year = {2008}, Year = {2008},
Pages = {145-156}, Pages = {145-156},
Date = {October 25 - October 27},
Owner = {jim}, Owner = {jim},
Quality = {1}, Quality = {1},
Timestamp = {2013.10.29} Timestamp = {2013.10.29}
@ -423,20 +420,20 @@ Zum Teil entspringt das Recht auch dem Gesellschaftsvertrag von Rousseau.},
@Article{Venkateswaran2001, @Article{Venkateswaran2001,
Title = {Virtual Private Networks}, Title = {Virtual Private Networks},
Author = {Venkateswaran, R.}, Author = {Venkateswaran, R.},
Journal = {IEEE Potentials}, Journaltitle = {IEEE Potentials},
Year = {2001}, Year = {2001},
Month = {Feb/Mar}, Month = {Feb/Mar},
Number = {1}, Number = {1},
Pages = {11--15}, Pages = {11--15},
Volume = {20}, Volume = {20},
Abstract = {A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links. VPN services enable remote access to the intranet at significantly lower cost, thus enabling support for a mobile workforce. Additionally, the VPN architecture support a reliable authentication mechanism to provide easy access to the intranet from anywhere using any available access media including analog modems, ISDN, cable modems, DSL and wireless. There are primarily three types of VPN services: (1) local area network (LAN) interconnect VPN services, (2) dial-up VPN services, and (3) Ethernet VPN services}, Abstract = {A virtual private network (VPN) can help resolve many of the issues associated with today's private networks. A VPN facilitates an agile IT infrastructure. Global VPNs enable connectivity to all locations anywhere in the world at a fraction of the cost of dedicated links. VPN services enable remote access to the intranet at significantly lower cost, thus enabling support for a mobile workforce. Additionally, the VPN architecture support a reliable authentication mechanism to provide easy access to the intranet from anywhere using any available access media including analog modems, ISDN, cable modems, DSL and wireless. There are primarily three types of VPN services: (1) local area network (LAN) interconnect VPN services, (2) dial-up VPN services, and (3) Ethernet VPN services},
Journal = {IEEE Potentials},
Owner = {jim}, Owner = {jim},
Timestamp = {2014.10.18} Timestamp = {2014.10.18}
} }
@PhdThesis{Weber, @Phdthesis{Weber,
Title = {IPSec Hochverfügbarkeit}, Title = {IPSec Hochverfügbarkeit},
Author = {Weber, Ulrich}, Author = {Weber, Ulrich},