Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 10 Treffer
- virtual machine 7 Treffer
- virtualization 7 Treffer
- access control 5 Treffer
- data security 5 Treffer
-
45 weitere Werte:
- sla 5 Treffer
- rsa 4 Treffer
- saas 4 Treffer
- anomaly detection 3 Treffer
- authentication 3 Treffer
- auto-scaling 3 Treffer
- cryptography 3 Treffer
- ddos 3 Treffer
- encryption 3 Treffer
- homomorphic encryption 3 Treffer
- intrusion detection 3 Treffer
- load balancing 3 Treffer
- resource allocation 3 Treffer
- service composition 3 Treffer
- anonymity 2 Treffer
- availability 2 Treffer
- cloud service 2 Treffer
- cloud service provider 2 Treffer
- data storage auditing 2 Treffer
- flash crowd 2 Treffer
- hadoop 2 Treffer
- multi-tenancy 2 Treffer
- multi-tenant 2 Treffer
- ontology 2 Treffer
- privacy 2 Treffer
- provable data possession 2 Treffer
- proxy re-encryption 2 Treffer
- qos 2 Treffer
- searchable encryption 2 Treffer
- storage 2 Treffer
- task scheduling 2 Treffer
- trust 2 Treffer
- trust model 2 Treffer
- 클라우드 컴퓨팅 2 Treffer
- abe 1 Treffer
- aco 1 Treffer
- adoption 1 Treffer
- aes 1 Treffer
- ahp 1 Treffer
- ahp. 1 Treffer
- als 1 Treffer
- apis 1 Treffer
- architecture 1 Treffer
- attribute-based encryption 1 Treffer
- b+ tree 1 Treffer
Verlag
Publikation
- international journal of security and its applications 53 Treffer
- international journal of software engineering and its applications 26 Treffer
- international journal of hybrid information technology 25 Treffer
- international journal of grid and distributed computing 7 Treffer
- 정보화연구 6 Treffer
- 6 weitere Werte:
Inhaltsanbieter
128 Treffer
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-01-30), Heft 1, S. 45-56academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 89-96academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 67-78academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 97-108academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 11-20academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 6 (2013-11-30), Heft 6, S. 389-398academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 6 (2013-11-30), Heft 6, S. 301-310academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 6 (2013-11-30), Heft 6, S. 333-344academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 243-256academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 7 (2013-03-30), Heft 2, S. 219-226academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-10-30), Heft 4, S. 25-32academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 6 (2012-10-30), Heft 4, S. 257-264academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-07-30), Heft 3, S. 75-82academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-07-30), Heft 3, S. 1-10academicJournalZugriff:
-
Technique of designing an e-health System using Social Networking : 소셜 네트워킹을 이용한 e-Health 시스템의 설계 기법In: 한국차세대컴퓨팅학회 논문지, Jg. 8 (2012-06-30), Heft 3, S. 27-37academicJournalZugriff:
-
In: 한국차세대컴퓨팅학회 논문지, Jg. 8 (2012-06-30), Heft 3, S. 57-65academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 9 (2012-06-30), Heft 3, S. 251-260academicJournalZugriff:
-
In: 한국경영정보학회 정기 학술대회, 2012-06-14, S. 191-204academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 307-312academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 241-244academicJournalZugriff: