Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Weniger Treffer
Art der Quelle
Thema
- 정보보호 3 Treffer
- cryptography 2 Treffer
- mobile network 2 Treffer
- network security 2 Treffer
- password 2 Treffer
-
45 weitere Werte:
- quantum cryptography 2 Treffer
- quantum key distribution 2 Treffer
- security protocols 2 Treffer
- smart card 2 Treffer
- smart cards 2 Treffer
- academic achievement 1 Treffer
- access control 1 Treffer
- assessment indices 1 Treffer
- attribute-based encryption 1 Treffer
- authentication 1 Treffer
- authentication protocol 1 Treffer
- authentication scheme 1 Treffer
- bayesian network 1 Treffer
- biometrics 1 Treffer
- black box 1 Treffer
- capacity 1 Treffer
- cc(common criteria) 1 Treffer
- cloud computing service 1 Treffer
- confusion 1 Treffer
- converged security 1 Treffer
- correlation analysis 1 Treffer
- cyber security 1 Treffer
- diffusion 1 Treffer
- digital certificate 1 Treffer
- e-commerce 1 Treffer
- edutainment 1 Treffer
- electronic government 1 Treffer
- event correlation 1 Treffer
- feedback 1 Treffer
- forensic 1 Treffer
- information assurance 1 Treffer
- information security management systems 1 Treffer
- it governance 1 Treffer
- item response theory 1 Treffer
- key agreement 1 Treffer
- klt 1 Treffer
- learning contents 1 Treffer
- least significant bit 1 Treffer
- mobile government 1 Treffer
- mobile security 1 Treffer
- moving target defense 1 Treffer
- multi-server architecture 1 Treffer
- national security 1 Treffer
- personal information protection 1 Treffer
- physical security 1 Treffer
Verlag
Publikation
Inhaltsanbieter
34 Treffer
-
In: 디지털융복합연구, Jg. 17 (2019-09-30), Heft 9, S. 161-171academicJournalZugriff:
-
In: 디지털융복합연구, Jg. 7 (2009-03-30), Heft 1, S. 175-183academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 283-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 37-46academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 229-238academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 165-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 119-128academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 129-138academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 13 (2016-04-30), Heft 2, S. 143-154academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 415-426academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 45-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 77-94academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 367-374academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 12 (2015-08-30), Heft 4, S. 363-378academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-07-30), Heft 7, S. 243-252academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 12 (2015-06-30), Heft 3, S. 191-206academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 319-334academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 147-160academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 8 (2014-11-30), Heft 11, S. 1-10academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 127-136academicJournalZugriff: