Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication 10 Treffer
- anonymity 4 Treffer
- password 4 Treffer
- biometric 3 Treffer
- cryptanalysis 3 Treffer
-
41 weitere Werte:
- key agreement 3 Treffer
- multi-server 3 Treffer
- user anonymity 3 Treffer
- elliptic curve cryptosystem 2 Treffer
- information security 2 Treffer
- key exchange 2 Treffer
- multi-server architecture 2 Treffer
- mutual authentication 2 Treffer
- network security 2 Treffer
- side-channel attack 2 Treffer
- authenticated key exchange 1 Treffer
- authentication scheme 1 Treffer
- authentication. 1 Treffer
- cc 1 Treffer
- cmvp 1 Treffer
- control flow graph 1 Treffer
- dynamic identity 1 Treffer
- emv 1 Treffer
- fault attack 1 Treffer
- forgery attack 1 Treffer
- fuzzy extractor 1 Treffer
- java card 1 Treffer
- man-in-the-middle attack 1 Treffer
- model-based testing 1 Treffer
- one-time password 1 Treffer
- privacy-preserving 1 Treffer
- remote authentication 1 Treffer
- remote user authentication 1 Treffer
- roaming service 1 Treffer
- s/key 1 Treffer
- security model 1 Treffer
- sysml 1 Treffer
- three-party protocol 1 Treffer
- user authentication 1 Treffer
- validation tool 1 Treffer
- vulnerability 1 Treffer
- wireless network 1 Treffer
- wireless sensor network 1 Treffer
- 스마트 카드 1 Treffer
- 인증 1 Treffer
- 패스워드 1 Treffer
Verlag
Publikation
Inhaltsanbieter
27 Treffer
-
In: International Journal of Smart Home, Jg. 9 (2015-09-30), Heft 9, S. 177-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 311-322academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 193-204academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 163-170academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 315-328academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 419-428academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 297-312academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 367-374academicJournalZugriff:
-
An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic IdentityIn: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 255-268academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 397-408academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 127-136academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-07-30), Heft 4, S. 307-320academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-01-30), Heft 1, S. 373-388academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 335-344academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 433-444academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 119-126academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 105-118academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 271-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-03-30), Heft 2, S. 105-116academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 6 (2013-03-30), Heft 2, S. 75-84academicJournalZugriff: