doi.org/10.1038/scientificamerican0573-15

Preview meta tags from the doi.org website.

Linked Hostnames

7

Thumbnail

Search Engine Appearance

Google

https://doi.org/10.1038/scientificamerican0573-15

Cryptography and Computer Privacy

Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer



Bing

Cryptography and Computer Privacy

https://doi.org/10.1038/scientificamerican0573-15

Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer



DuckDuckGo

https://doi.org/10.1038/scientificamerican0573-15

Cryptography and Computer Privacy

Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer

  • General Meta Tags

    6
    • title
      Cryptography and Computer Privacy | Scientific American
    • charset
      utf-8
    • theme-color
      #fff
    • author
      Horst Feistel
    • description
      Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
  • Open Graph Meta Tags

    8
    • og:url
      https://www.scientificamerican.com/article/cryptography-and-computer-privacy/
    • og:image
      https://www.scientificamerican.com/static/sciam-mark.jpg
    • og:title
      Cryptography and Computer Privacy
    • og:description
      Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
    • og:site_name
      Scientific American
  • Twitter Meta Tags

    7
    • twitter:image
      https://www.scientificamerican.com/static/sciam-mark.jpg
    • twitter:title
      Cryptography and Computer Privacy
    • twitter:description
      Computer systems in general and personal "data banks" in particular need protection. This can be achieved by enciphering all material and authenticating the legitimate origin of any command to the computer
    • twitter:image:alt
      Scientific American Logo
    • twitter:site
      @sciam
  • Link Tags

    36
    • alternate
      https://www.scientificamerican.com/platform/syndication/rss/
    • canonical
      https://www.scientificamerican.com/article/cryptography-and-computer-privacy/
    • icon shortcut
      /static/favicon.ico
    • modulepreload
      /static/chunks/preload-helper-4aa0ec7d.js
    • modulepreload
      /static/chunks/vendor-react-3ae51473.js

Links

29