vault backup: 2023-08-13 12:57:36
This commit is contained in:
81
.obsidian/workspace.json
vendored
81
.obsidian/workspace.json
vendored
@@ -7,26 +7,6 @@
|
|||||||
"id": "e403734ae4b6cb9c",
|
"id": "e403734ae4b6cb9c",
|
||||||
"type": "tabs",
|
"type": "tabs",
|
||||||
"children": [
|
"children": [
|
||||||
{
|
|
||||||
"id": "a2154279c26415c2",
|
|
||||||
"type": "leaf",
|
|
||||||
"state": {
|
|
||||||
"type": "pdf",
|
|
||||||
"state": {
|
|
||||||
"file": "CCN/Ilias/Lecture/CCN-8 - ExamPrep.pdf"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "a9dbb63c18f5e620",
|
|
||||||
"type": "leaf",
|
|
||||||
"state": {
|
|
||||||
"type": "pdf",
|
|
||||||
"state": {
|
|
||||||
"file": "CCN/Ilias/Lecture/CCN-8 - ExamPrep.pdf"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"id": "c3af0db6aa583dc9",
|
"id": "c3af0db6aa583dc9",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
@@ -38,9 +18,51 @@
|
|||||||
"source": false
|
"source": false
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "eedb7272cfe7b86f",
|
||||||
|
"type": "leaf",
|
||||||
|
"state": {
|
||||||
|
"type": "pdf",
|
||||||
|
"state": {
|
||||||
|
"file": "Informationssicherheit/Ilias/Vorlesungen/05-sym-krypto-aes-handout.pdf"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "8bc1dcc239021b16",
|
||||||
|
"type": "leaf",
|
||||||
|
"state": {
|
||||||
|
"type": "pdf",
|
||||||
|
"state": {
|
||||||
|
"file": "Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "1607381032360c91",
|
||||||
|
"type": "leaf",
|
||||||
|
"state": {
|
||||||
|
"type": "markdown",
|
||||||
|
"state": {
|
||||||
|
"file": "Informationssicherheit/Ueb5/Ueb5.md",
|
||||||
|
"mode": "source",
|
||||||
|
"source": false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "0e35466336c21de8",
|
||||||
|
"type": "leaf",
|
||||||
|
"state": {
|
||||||
|
"type": "pdf",
|
||||||
|
"state": {
|
||||||
|
"file": "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf"
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"currentTab": 2
|
"currentTab": 4
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"direction": "vertical"
|
"direction": "vertical"
|
||||||
@@ -114,7 +136,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "backlink",
|
"type": "backlink",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Informationssicherheit/Ueb6/Ueb 6.md",
|
"file": "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf",
|
||||||
"collapseAll": false,
|
"collapseAll": false,
|
||||||
"extraContext": false,
|
"extraContext": false,
|
||||||
"sortOrder": "alphabetical",
|
"sortOrder": "alphabetical",
|
||||||
@@ -131,7 +153,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "outgoing-link",
|
"type": "outgoing-link",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Informationssicherheit/Ueb6/Ueb 6.md",
|
"file": "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf",
|
||||||
"linksCollapsed": false,
|
"linksCollapsed": false,
|
||||||
"unlinkedCollapsed": true
|
"unlinkedCollapsed": true
|
||||||
}
|
}
|
||||||
@@ -154,7 +176,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "outline",
|
"type": "outline",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Informationssicherheit/Ueb6/Ueb 6.md"
|
"file": "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -215,10 +237,15 @@
|
|||||||
"obsidian-wordnet-plugin:WordNet Dictionary": false
|
"obsidian-wordnet-plugin:WordNet Dictionary": false
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"active": "c3af0db6aa583dc9",
|
"active": "0e35466336c21de8",
|
||||||
"lastOpenFiles": [
|
"lastOpenFiles": [
|
||||||
|
"Informationssicherheit/Ilias/Vorlesungen/06-hash-mac-handout.pdf",
|
||||||
|
"Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf",
|
||||||
|
"Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf",
|
||||||
"Informationssicherheit/Ueb5/Ueb5.md",
|
"Informationssicherheit/Ueb5/Ueb5.md",
|
||||||
"Informationssicherheit/Ueb5/new UEB5.md",
|
"Informationssicherheit/Ueb5/new UEB5.md",
|
||||||
|
"Informationssicherheit/Ilias/Vorlesungen/05-sym-krypto-aes-handout.pdf",
|
||||||
|
"Informationssicherheit/Ueb6/Ueb 6.md",
|
||||||
"Informationssicherheit/Ueb4/Ueb4.md",
|
"Informationssicherheit/Ueb4/Ueb4.md",
|
||||||
"Informationssicherheit/Ueb2/Ueb2.md",
|
"Informationssicherheit/Ueb2/Ueb2.md",
|
||||||
"Informationssicherheit/Ilias/ueb/04-ueb_uebungsblatt.pdf",
|
"Informationssicherheit/Ilias/ueb/04-ueb_uebungsblatt.pdf",
|
||||||
@@ -228,14 +255,10 @@
|
|||||||
"CCN/Ilias/Excercises/ccn1-exercise5_solution.pdf",
|
"CCN/Ilias/Excercises/ccn1-exercise5_solution.pdf",
|
||||||
"CCN/Ilias/Excercises/ccn1-exercise4_solution.pdf",
|
"CCN/Ilias/Excercises/ccn1-exercise4_solution.pdf",
|
||||||
"CCN/Ilias/Excercises/ccn1-exercise3_solution.pdf",
|
"CCN/Ilias/Excercises/ccn1-exercise3_solution.pdf",
|
||||||
"CCN/Ilias/Excercises/ccn1-exercise2_solution.pdf",
|
|
||||||
"CCN/Ilias/Excercises/ccn1-exercise1_solution.pdf",
|
|
||||||
"CCN/Ilias/Lecture/CCN-8 - ExamPrep.pdf",
|
|
||||||
"Informationssicherheit/Ueb9/UEB_09.md",
|
"Informationssicherheit/Ueb9/UEB_09.md",
|
||||||
"English/KW26.md",
|
"English/KW26.md",
|
||||||
"Informationssicherheit/Ueb7/Ueb07.md",
|
"Informationssicherheit/Ueb7/Ueb07.md",
|
||||||
"Informationssicherheit/UEB8/UEB08.md",
|
"Informationssicherheit/UEB8/UEB08.md",
|
||||||
"Informationssicherheit/Ueb6/Ueb 6.md",
|
|
||||||
"English/KW21.md",
|
"English/KW21.md",
|
||||||
"Mathe/KW20/KW20.md",
|
"Mathe/KW20/KW20.md",
|
||||||
"Informationssicherheit/Ueb4/Ueb4 - Kopie.md",
|
"Informationssicherheit/Ueb4/Ueb4 - Kopie.md",
|
||||||
|
|||||||
Reference in New Issue
Block a user