Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication 4 Treffer
- smart card 3 Treffer
- cloud computing 2 Treffer
- security 2 Treffer
- cryptography 1 Treffer
-
19 weitere Werte:
- elliptic curve cryptography 1 Treffer
- forgery attack 1 Treffer
- forward security 1 Treffer
- key agreement 1 Treffer
- key establishment 1 Treffer
- manets 1 Treffer
- network coding 1 Treffer
- one-way authentication 1 Treffer
- password 1 Treffer
- privacy 1 Treffer
- privacy preservation 1 Treffer
- privacy protection 1 Treffer
- roaming service 1 Treffer
- rsa 1 Treffer
- traceability 1 Treffer
- vehicular ad-hoc network 1 Treffer
- wireless network 1 Treffer
- wireless security 1 Treffer
- zero-knowledge proof 1 Treffer
Sprache
Inhaltsanbieter
12 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 41-56academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 63-72academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 229-240academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 147-156academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 285-292academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 387-396academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 127-136academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 185-194academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 335-344academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 271-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-10-30), Heft 4, S. 141-150academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-07-30), Heft 3, S. 45-54academicJournalZugriff: