@article{Werner2022, author = {Werner, Petra}, title = {Ernste Kunst kann nicht gedeihen ohne Gunst}, series = {HiN : Alexander von Humboldt im Netz ; International Review for Humboldtian Studies}, volume = {XXIII}, journal = {HiN : Alexander von Humboldt im Netz ; International Review for Humboldtian Studies}, number = {44}, editor = {Ette, Ottmar and Knobloch, Eberhard}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, issn = {1617-5239}, doi = {10.25932/publishup-58997}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-589975}, pages = {161 -- 171}, year = {2022}, abstract = {Albert Berg (1825-1884) was the first director of the Silesian Art Museum in Breslau. He was supported by a network of sponsors, who advised him on planning his trips and bought paintings (or arranged purchases). A particularly important mentor beginning in 1849 was Alexander von Humboldt, also the singer Amalie Joachim. Berg made a number of important contacts with fellow students during his law studies in Bonn. He formed a particularly close relationship with Friedrich Franz II von Mecklenburg-Schwerin, who, in 1844, invited Berg to a journey. This expedition marked the beginning of a lifelong friendship. Friedrich Franz II bought numerous paintings from Berg and worked behind the scenes to organize Berg's career.}, language = {de} } @misc{Lunemann2006, type = {Master Thesis}, author = {Lunemann, Carolin}, title = {Quantum cryptography : security analysis of multiuser quantum communication with embedded authentication}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus-12756}, school = {Universit{\"a}t Potsdam}, year = {2006}, abstract = {Three quantum cryptographic protocols of multiuser quantum networks with embedded authentication, allowing quantum key distribution or quantum direct communication, are discussed in this work. The security of the protocols against different types of attacks is analysed with a focus on various impersonation attacks and the man-in-the-middle attack. On the basis of the security analyses several improvements are suggested and implemented in order to adjust the investigated vulnerabilities. Furthermore, the impact of the eavesdropping test procedure on impersonation attacks is outlined. The framework of a general eavesdropping test is proposed to provide additional protection against security risks in impersonation attacks.}, language = {en} } @article{BinderMettenberger2023, author = {Binder, Julia and Mettenberger, Tobias}, title = {Schl{\"u}sselfiguren in l{\"a}ndlichen Netzwerken}, series = {KWI-Schriften}, journal = {KWI-Schriften}, number = {14}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, isbn = {978-3-86956-571-2}, issn = {1867-951X}, doi = {10.25932/publishup-63113}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-631133}, pages = {39 -- 50}, year = {2023}, language = {de} } @article{BembnistaMettenbergerZscherneck2023, author = {Bembnista, Kamil and Mettenberger, Tobias and Zscherneck, Julia}, title = {Soziale Netzwerke als Ressourcenzug{\"a}nge f{\"u}r Digitale Pioniere}, series = {KWI-Schriften}, journal = {KWI-Schriften}, number = {14}, publisher = {Universit{\"a}tsverlag Potsdam}, address = {Potsdam}, isbn = {978-3-86956-571-2}, issn = {1867-951X}, doi = {10.25932/publishup-63115}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-631156}, pages = {51 -- 72}, year = {2023}, language = {de} }