Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication 15 Treffer
- privacy 8 Treffer
- cloud computing 7 Treffer
- access control 6 Treffer
- encryption 6 Treffer
-
45 weitere Werte:
- rfid 5 Treffer
- trust 5 Treffer
- authentication protocol 4 Treffer
- aes 3 Treffer
- hash function 3 Treffer
- key management 3 Treffer
- policy 3 Treffer
- risk 3 Treffer
- agent 2 Treffer
- algorithm 2 Treffer
- android 2 Treffer
- anonymity 2 Treffer
- attack 2 Treffer
- big data 2 Treffer
- blowfish 2 Treffer
- detection 2 Treffer
- digital signature 2 Treffer
- internet of things 2 Treffer
- malware 2 Treffer
- manets 2 Treffer
- mobile agent 2 Treffer
- model 2 Treffer
- operating system 2 Treffer
- password 2 Treffer
- performance 2 Treffer
- privacy protection 2 Treffer
- rbac 2 Treffer
- risk assessment 2 Treffer
- risk management 2 Treffer
- sla 2 Treffer
- steganography 2 Treffer
- trusted computing 2 Treffer
- utaut 2 Treffer
- web application 2 Treffer
- wireless body area network 2 Treffer
- wireless sensor network 2 Treffer
- wireless sensor networks 2 Treffer
- #-mail 1 Treffer
- accuracy 1 Treffer
- advanced encryption standard 1 Treffer
- aggregate signature 1 Treffer
- ami 1 Treffer
- analysis 1 Treffer
- anomaly detection 1 Treffer
- anonymous 1 Treffer
Sprache
Inhaltsanbieter
120 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 17-26academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 179-188academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 177-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 261-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 229-240academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 43-52academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 79-88academicJournalZugriff:
-
Secure Wireless Body Area Network (WBAN) Communication Method Using New Random Key Management SchemeIn: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 13-22academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 261-270academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 57-66academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 107-118academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 67-76academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 13-20academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 211-228academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 295-302academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 131-144academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 39-48academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 259-268academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 83-92academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 205-214academicJournalZugriff: