Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- cryptography 2 Treffer
- encryption 2 Treffer
- network security 2 Treffer
- smart card 2 Treffer
- aes 1 Treffer
-
14 weitere Werte:
- algorithm 1 Treffer
- authentication 1 Treffer
- cipher text 1 Treffer
- cryptology 1 Treffer
- decryption 1 Treffer
- fully homomorphic encryption 1 Treffer
- genetic algorithm 1 Treffer
- hash function 1 Treffer
- key agreement 1 Treffer
- lattice reduction 1 Treffer
- n-grams 1 Treffer
- remote user authentication 1 Treffer
- user anonymity 1 Treffer
- user authentication 1 Treffer
Sprache
Inhaltsanbieter
8 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 355-360academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 419-428academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 295-304academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 241-246academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 55-60academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 249-258academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-03-30), Heft 2, S. 105-116academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 103-108academicJournalZugriff: