Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- copyright protection 2 Treffer
- discrete wavelet transform 2 Treffer
- arnold transformation 1 Treffer
- cryptography 1 Treffer
- dct 1 Treffer
-
23 weitere Werte:
- digital audio 1 Treffer
- discrete cosine transform 1 Treffer
- discrete fractional random transform 1 Treffer
- dwt 1 Treffer
- fidelity 1 Treffer
- genetic algorithm 1 Treffer
- hologram 1 Treffer
- image 1 Treffer
- image authentication 1 Treffer
- image normalization 1 Treffer
- image recovery 1 Treffer
- multimedia fingerprinting 1 Treffer
- psnr 1 Treffer
- radon transform 1 Treffer
- rotation invariant 1 Treffer
- secret sharing 1 Treffer
- security analysis 1 Treffer
- social network 1 Treffer
- tamper detection 1 Treffer
- time stamp 1 Treffer
- tournament selection 1 Treffer
- vector quantization 1 Treffer
- wireless sensor networks 1 Treffer
Sprache
Inhaltsanbieter
11 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 191-206academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 107-118academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 209-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 303-314academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 405-412academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 299-306academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 255-266academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 209-228academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 407-416academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 5 (2011-04-30), Heft 2, S. 33-48academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 5 (2011-01-30), Heft 1, S. 1-12academicJournalZugriff: