Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 10 Treffer
- virtual machine 7 Treffer
- virtualization 7 Treffer
- access control 5 Treffer
- data security 5 Treffer
-
45 weitere Werte:
- sla 5 Treffer
- rsa 4 Treffer
- saas 4 Treffer
- anomaly detection 3 Treffer
- authentication 3 Treffer
- auto-scaling 3 Treffer
- cryptography 3 Treffer
- ddos 3 Treffer
- encryption 3 Treffer
- homomorphic encryption 3 Treffer
- intrusion detection 3 Treffer
- load balancing 3 Treffer
- resource allocation 3 Treffer
- service composition 3 Treffer
- anonymity 2 Treffer
- availability 2 Treffer
- cloud service 2 Treffer
- cloud service provider 2 Treffer
- data storage auditing 2 Treffer
- flash crowd 2 Treffer
- hadoop 2 Treffer
- multi-tenancy 2 Treffer
- multi-tenant 2 Treffer
- ontology 2 Treffer
- privacy 2 Treffer
- provable data possession 2 Treffer
- proxy re-encryption 2 Treffer
- qos 2 Treffer
- searchable encryption 2 Treffer
- storage 2 Treffer
- task scheduling 2 Treffer
- trust 2 Treffer
- trust model 2 Treffer
- 클라우드 컴퓨팅 2 Treffer
- abe 1 Treffer
- aco 1 Treffer
- adoption 1 Treffer
- aes 1 Treffer
- ahp 1 Treffer
- ahp. 1 Treffer
- als 1 Treffer
- apis 1 Treffer
- architecture 1 Treffer
- attribute-based encryption 1 Treffer
- b+ tree 1 Treffer
Verlag
Publikation
- international journal of security and its applications 53 Treffer
- international journal of software engineering and its applications 26 Treffer
- international journal of hybrid information technology 25 Treffer
- international journal of grid and distributed computing 7 Treffer
- 정보화연구 6 Treffer
- 6 weitere Werte:
Inhaltsanbieter
128 Treffer
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 275-284academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 197-212academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-08-30), Heft 8, S. 35-46academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 323-336academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 95-110academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 1-14academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 153-162academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 159-170academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-07-30), Heft 7, S. 389-398academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-07-30), Heft 7, S. 37-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 61-70academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-06-30), Heft 6, S. 205-216academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 319-324academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 345-360academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 11-20academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 217-228academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 67-72academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 8 (2015-04-30), Heft 4, S. 201-212academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 363-370academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 285-292academicJournalZugriff: