Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- internet of things 5 Treffer
- cryptography 4 Treffer
- task analysis 4 Treffer
- computer security 3 Treffer
- encryption 3 Treffer
-
45 weitere Werte:
- optimization 3 Treffer
- software 3 Treffer
- blockchains 2 Treffer
- cameras 2 Treffer
- companies 2 Treffer
- complexity theory 2 Treffer
- cybersecurity 2 Treffer
- hardware 2 Treffer
- performance evaluation 2 Treffer
- privacy 2 Treffer
- protocols 2 Treffer
- servers 2 Treffer
- smart homes 2 Treffer
- software algorithms 2 Treffer
- wireless communication 2 Treffer
- adoption 1 Treffer
- adversarial attacks 1 Treffer
- advertising 1 Treffer
- algorithm 1 Treffer
- armv8 1 Treffer
- artificial neural network 1 Treffer
- artificial neural networks 1 Treffer
- attack models 1 Treffer
- authentication 1 Treffer
- autonomous aerial vehicles 1 Treffer
- benchmark testing 1 Treffer
- bibliographies 1 Treffer
- bipartite graph 1 Treffer
- blind detection 1 Treffer
- blockchain 1 Treffer
- blockchain platforms 1 Treffer
- brain modeling 1 Treffer
- browsers 1 Treffer
- cellular phones 1 Treffer
- cloud computing 1 Treffer
- cloud/edge computing 1 Treffer
- communication complexity 1 Treffer
- communication system security 1 Treffer
- communications technology 1 Treffer
- computation offloading 1 Treffer
- computational modeling 1 Treffer
- computer architecture 1 Treffer
- computer crime 1 Treffer
- computer hacking 1 Treffer
- computer networks 1 Treffer
Inhaltsanbieter
22 Treffer
-
In: IEEE Access, Jg. 11 (2023), S. 9182-9196Online academicJournalZugriff:
-
In: IEEE Access, Jg. 12 (2024), S. 39450-39469Online academicJournalZugriff:
-
In: IEEE Access, Jg. 12 (2024), S. 36296-36310Online academicJournalZugriff:
-
In: IEEE Access, Jg. 12 (2024), S. 53408-53423Online academicJournalZugriff:
-
In: IEEE Access, Jg. 12 (2024), S. 10069-10086Online academicJournalZugriff:
-
In: IEEE Access, Jg. 11 (2023), S. 133475-133489Online academicJournalZugriff:
-
In: IEEE Access, Jg. 11 (2023), S. 19836-19848Online academicJournalZugriff:
-
In: IEEE Access, Jg. 11 (2023), S. 60562-60577Online academicJournalZugriff:
-
In: IEEE Access, Jg. 11 (2023), S. 64679-64696Online academicJournalZugriff:
-
In: IEEE Access, Jg. 11 (2023), S. 66428-66439Online academicJournalZugriff:
-
In: IEEE Access, Jg. 11 (2023), S. 85561-85570Online academicJournalZugriff:
-
In: IEEE Access, Jg. 10 (2022), S. 44446-44460Online academicJournalZugriff:
-
In: IEEE Access, Jg. 10 (2022), S. 76114-76124Online academicJournalZugriff:
-
In: IEEE Access, Jg. 10 (2022), S. 104577-104588Online academicJournalZugriff:
-
In: IEEE Access, Jg. 9 (2021), S. 12405-12419Online academicJournalZugriff:
-
A Comprehensive and Reproducible Comparison of Cryptographic Primitives Execution on Android DevicesIn: IEEE Access, Jg. 9 (2021), S. 54625-54638Online academicJournalZugriff:
-
In: IEEE Access, Jg. 8 (2020), S. 72650-72660Online academicJournalZugriff:
-
In: IEEE Access, Jg. 7 (2019), S. 152891-152899Online academicJournalZugriff:
-
In: IEEE Access, Jg. 7 (2019), S. 168020-168028Online academicJournalZugriff:
-
In: IEEE Access, Jg. 6 (2018), S. 42578-42578Online academicJournalZugriff: