Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 16 Treffer
- cloud computing 6 Treffer
- encryption 6 Treffer
- smart card 6 Treffer
- privacy 5 Treffer
-
45 weitere Werte:
- access control 4 Treffer
- anonymity 4 Treffer
- confidentiality 3 Treffer
- key agreement 3 Treffer
- multi-server 3 Treffer
- network security 3 Treffer
- password 3 Treffer
- watermarking 3 Treffer
- data security 2 Treffer
- decryption 2 Treffer
- graphical password 2 Treffer
- integrity 2 Treffer
- internet of things 2 Treffer
- session key 2 Treffer
- trust 2 Treffer
- wireless sensor network 2 Treffer
- 3gpp 1 Treffer
- abe 1 Treffer
- aes algorithm 1 Treffer
- aggregate signature 1 Treffer
- ais 1 Treffer
- aka 1 Treffer
- ami 1 Treffer
- android 1 Treffer
- anonymous 1 Treffer
- authorization 1 Treffer
- availability 1 Treffer
- biological characteristics 1 Treffer
- biometric 1 Treffer
- biometry 1 Treffer
- blind 1 Treffer
- bus information system 1 Treffer
- certificate 1 Treffer
- certificateless cryptography 1 Treffer
- color image 1 Treffer
- consensus 1 Treffer
- cps 1 Treffer
- credential 1 Treffer
- cryptanalysis 1 Treffer
- cryptographic 1 Treffer
- cryptography 1 Treffer
- data fusion 1 Treffer
- data privacy 1 Treffer
- database 1 Treffer
- dct 1 Treffer
Verlag
Publikation
- international journal of security and its applications 52 Treffer
- international journal of grid and distributed computing 6 Treffer
- international journal of database theory and application 2 Treffer
- international journal of u- and e- service, science and technology 2 Treffer
- international journal of signal processing, image processing and pattern recognition 1 Treffer
Inhaltsanbieter
63 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 261-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 43-52academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 79-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 257-264academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 9 (2016-09-30), Heft 9, S. 205-212academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 365-374academicJournalZugriff:
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 9 (2016-04-30), Heft 4, S. 425-434academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 63-70academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 29-40academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 163-170academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 9 (2016-01-30), Heft 1, S. 49-56academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 175-196academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 149-164academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 129-136academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 8 (2015-12-30), Heft 6, S. 9-18academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 419-428academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 155-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 201-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 265-274academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 131-140academicJournalZugriff: