Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- computer security 434 Treffer
- security systems 143 Treffer
- cryptography 110 Treffer
- privacy 110 Treffer
- data encryption 107 Treffer
-
45 weitere Werte:
- computer network security 105 Treffer
- computer network protocols 102 Treffer
- access control 101 Treffer
- data protection 100 Treffer
- security 84 Treffer
- data security 74 Treffer
- algorithms 61 Treffer
- computer systems 53 Treffer
- computer software 49 Treffer
- computer networks 48 Treffer
- computer security research 48 Treffer
- security management 42 Treffer
- cloud computing 39 Treffer
- databases 39 Treffer
- computer access control 38 Treffer
- computer science 38 Treffer
- machine learning 38 Treffer
- security protocols 35 Treffer
- authentication (law) 34 Treffer
- programming languages 34 Treffer
- semantics 34 Treffer
- data privacy 33 Treffer
- authentication 31 Treffer
- information flow 31 Treffer
- formal methods 29 Treffer
- digital signatures 28 Treffer
- internet 28 Treffer
- electronic data processing 27 Treffer
- public key cryptography 26 Treffer
- right of privacy 25 Treffer
- computer algorithms 24 Treffer
- malware 24 Treffer
- probability theory 24 Treffer
- web-based user interfaces 24 Treffer
- formal verification 23 Treffer
- internet of things 23 Treffer
- computer passwords 22 Treffer
- information theory 22 Treffer
- mobile communication systems 22 Treffer
- data integrity 21 Treffer
- internet security 21 Treffer
- anonymity 20 Treffer
- cloud storage 20 Treffer
- computer programming 20 Treffer
- confidential communications 20 Treffer
Sprache
Geographischer Bezug
Inhaltsanbieter
1.197 Treffer
-
In: Journal of Computer Security, Jg. 17 (2009-12-01), Heft 6, S. 969-971Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 32 (2024-03-01), Heft 2, S. 77-115Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 32 (2024), Heft 1, S. 31-52Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 32 (2024), Heft 1, S. 53-76Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 615-645Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 421-467Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 469-499Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 501-538Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 581-614Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 539-580Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-07-01), Heft 4, S. 393-417Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-07-01), Heft 4, S. 365-391Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-07-01), Heft 4, S. 293-364Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 581-614Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 421-467Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 615-645Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 469-499Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 501-538Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 31 (2023-09-01), Heft 5, S. 539-580Online academicJournalZugriff:
-
In: Journal of Computer Security, Jg. 30 (2022-05-01), Heft 3, S. 499-515Online academicJournalZugriff: