Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication protocol 5 Treffer
- security 5 Treffer
- hash function 4 Treffer
- privacy 3 Treffer
- authentication 2 Treffer
-
45 weitere Werte:
- internet of things 2 Treffer
- iot 2 Treffer
- mutual authentication 2 Treffer
- protocol 2 Treffer
- security protocol 2 Treffer
- untraceability 2 Treffer
- anti-collision 1 Treffer
- anti-collision algorithm 1 Treffer
- b2c 1 Treffer
- bar code 1 Treffer
- ble beacon 1 Treffer
- block cipher 1 Treffer
- bluetooth 1 Treffer
- cognitive styles 1 Treffer
- comparison 1 Treffer
- distribution system 1 Treffer
- elliptic curve cryptography 1 Treffer
- epc 1 Treffer
- hash 1 Treffer
- ipv6 1 Treffer
- iso/iec 18000-7 1 Treffer
- lagrange 1 Treffer
- location tracking system 1 Treffer
- mobile agent 1 Treffer
- mobile reader 1 Treffer
- ownership transfer 1 Treffer
- ownership transfer protocol 1 Treffer
- parallel processing 1 Treffer
- particle swarm 1 Treffer
- qr code 1 Treffer
- random number 1 Treffer
- sample 1 Treffer
- search protocol 1 Treffer
- security engineering 1 Treffer
- security issues 1 Treffer
- security requirement 1 Treffer
- security. 1 Treffer
- software engineering 1 Treffer
- tag 1 Treffer
- tag collection 1 Treffer
- tag identification 1 Treffer
- technology acceptance 1 Treffer
- the internet of things 1 Treffer
- u-healthcare 1 Treffer
- web services 1 Treffer
Verlag
Publikation
- international journal of security and its applications 18 Treffer
- 보안공학연구논문지 5 Treffer
- international journal of hybrid information technology 4 Treffer
- international journal of software engineering and its applications 4 Treffer
- international journal of multimedia and ubiquitous engineering 1 Treffer
- 2 weitere Werte:
Inhaltsanbieter
34 Treffer
-
In: International Journal of Multimedia and Ubiquitous Engineering, Jg. 10 (2015-10-30), Heft 10, S. 177-186academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 8 (2015-03-30), Heft 3, S. 179-188academicJournalZugriff:
-
In: JITAM, Jg. 17 (2010-09-30), Heft 3, S. 99-119academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 399-408academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-10-30), Heft 10, S. 229-238academicJournalZugriff:
-
RFID Tag Dynamic Ownership Transfer Protocol based on Lagrange of Multi-owner with Different WeightsIn: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 185-192academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 99-106academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-05-30), Heft 5, S. 251-262academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 13 (2016-04-30), Heft 2, S. 91-98academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 369-382academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 165-174academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 201-208academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 117-126academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 211-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 209-216academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-06-30), Heft 6, S. 25-34academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 255-260academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 33-42academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 225-234academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-07-30), Heft 4, S. 59-66academicJournalZugriff: