Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 16 Treffer
- smart card 10 Treffer
- anonymity 5 Treffer
- encryption 4 Treffer
- password 4 Treffer
-
45 weitere Werte:
- privacy 4 Treffer
- access control 3 Treffer
- cloud computing 3 Treffer
- key agreement 3 Treffer
- multi-server 3 Treffer
- watermarking 3 Treffer
- cryptanalysis 2 Treffer
- graphical password 2 Treffer
- internet of things 2 Treffer
- key exchange 2 Treffer
- network security 2 Treffer
- rfid 2 Treffer
- session key 2 Treffer
- wireless sensor network 2 Treffer
- 인증 2 Treffer
- 3gpp 1 Treffer
- abe 1 Treffer
- advanced encryption standard (aes) 1 Treffer
- aes algorithm 1 Treffer
- aggregate signature 1 Treffer
- ais 1 Treffer
- aka 1 Treffer
- ami 1 Treffer
- android 1 Treffer
- anonymous 1 Treffer
- auditing 1 Treffer
- authorization 1 Treffer
- biological characteristics 1 Treffer
- biometric 1 Treffer
- blind 1 Treffer
- bus information system 1 Treffer
- certificate 1 Treffer
- certificateless cryptography 1 Treffer
- clock synchronization 1 Treffer
- color image 1 Treffer
- confidentiality 1 Treffer
- cps 1 Treffer
- credential 1 Treffer
- cryptographic 1 Treffer
- cryptography 1 Treffer
- data security 1 Treffer
- database 1 Treffer
- dct 1 Treffer
- decryption 1 Treffer
- discrete wavelet transform (dwt) 1 Treffer
Verlag
Publikation
Inhaltsanbieter
60 Treffer
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 175-196academicJournalZugriff:
-
In: International Journal of Smart Home, Jg. 9 (2015-09-30), Heft 9, S. 177-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 261-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 43-52academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 79-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 257-264academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 365-374academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 13 (2016-04-30), Heft 2, S. 91-98academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 63-70academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 29-40academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 163-170academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 149-164academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 129-136academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 419-428academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 155-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 201-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 265-274academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 131-140academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 9-20academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 367-374academicJournalZugriff: