
doi.org/10.1038/scientificamerican0573-15
Preview meta tags from the doi.org website.
Linked Hostnames
7- 23 links todoi.org
- 1 link towww.facebook.com
- 1 link towww.instagram.com
- 1 link towww.linkedin.com
- 1 link towww.reddit.com
- 1 link towww.tiktok.com
- 1 link towww.youtube.com
Thumbnail

Search Engine Appearance
https://doi.org/10.1038/scientificamerican0573-15
Cryptography and Computer Privacy
Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
Bing
Cryptography and Computer Privacy
https://doi.org/10.1038/scientificamerican0573-15
Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
DuckDuckGo
https://doi.org/10.1038/scientificamerican0573-15
Cryptography and Computer Privacy
Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
General Meta Tags
6- titleCryptography and Computer Privacy | Scientific American
- charsetutf-8
- theme-color#fff
- authorHorst Feistel
- descriptionComputer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
Open Graph Meta Tags
8- og:urlhttps://www.scientificamerican.com/article/cryptography-and-computer-privacy/
- og:imagehttps://www.scientificamerican.com/static/sciam-mark.jpg
- og:titleCryptography and Computer Privacy
- og:descriptionComputer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
- og:site_nameScientific American
Twitter Meta Tags
7- twitter:imagehttps://www.scientificamerican.com/static/sciam-mark.jpg
- twitter:titleCryptography and Computer Privacy
- twitter:descriptionComputer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
- twitter:image:altScientific American Logo
- twitter:site@sciam
Link Tags
36- alternatehttps://www.scientificamerican.com/platform/syndication/rss/
- canonicalhttps://www.scientificamerican.com/article/cryptography-and-computer-privacy/
- icon shortcut/static/favicon.ico
- modulepreload/static/chunks/preload-helper-4aa0ec7d.js
- modulepreload/static/chunks/vendor-react-3ae51473.js
Links
29- https://doi.org
- https://doi.org/accessibility-statement
- https://doi.org/author/horst-feistel
- https://doi.org/games
- https://doi.org/getsciam