Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 3 Treffer
- blowfish 2 Treffer
- cryptography 2 Treffer
- des 2 Treffer
- encryption 2 Treffer
-
34 weitere Werte:
- rijndael 2 Treffer
- advanced encryption standard 1 Treffer
- algorithm 1 Treffer
- cipher text 1 Treffer
- cloud computing 1 Treffer
- cryptanalysis 1 Treffer
- cryptology 1 Treffer
- decryption 1 Treffer
- differential attacks 1 Treffer
- diffusion 1 Treffer
- ecc 1 Treffer
- embedded system 1 Treffer
- encryption/decryption 1 Treffer
- enhance 1 Treffer
- idea 1 Treffer
- image encryption 1 Treffer
- jade 1 Treffer
- java 1 Treffer
- key management scheme 1 Treffer
- linux 1 Treffer
- lookup table 1 Treffer
- low-cost 1 Treffer
- masking 1 Treffer
- mobile agent 1 Treffer
- performance 1 Treffer
- performance evaluation 1 Treffer
- power analysis 1 Treffer
- rsa 1 Treffer
- secret sharing 1 Treffer
- shuffling 1 Treffer
- side channel attacks 1 Treffer
- vhdl 1 Treffer
- wban 1 Treffer
- wireless body area network 1 Treffer
Sprache
Inhaltsanbieter
12 Treffer
-
Secure Wireless Body Area Network (WBAN) Communication Method Using New Random Key Management SchemeIn: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 13-22academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 59-92academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 11-24academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 353-360academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 241-246academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 157-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 19-30academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 117-124academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 295-302academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 1-16academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 127-134academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-10-30), Heft 4, S. 207-214academicJournalZugriff: