Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- encryption 3 Treffer
- authentication 1 Treffer
- blowfish 1 Treffer
- cbc 1 Treffer
- certificateless public key cryptography 1 Treffer
-
18 weitere Werte:
- cloud computing 1 Treffer
- data security 1 Treffer
- database encryption 1 Treffer
- des 1 Treffer
- dns 1 Treffer
- dnssec 1 Treffer
- encapsulation 1 Treffer
- image encryption 1 Treffer
- public key infrastructure 1 Treffer
- query 1 Treffer
- robustness 1 Treffer
- sanitization 1 Treffer
- secure 1 Treffer
- security 1 Treffer
- sensitive 1 Treffer
- signature 1 Treffer
- unforgeability 1 Treffer
- wireless sensor network 1 Treffer
Sprache
Inhaltsanbieter
8 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 331-340academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 299-308academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 155-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 329-336academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 217-224academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 195-204academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 61-68academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-01-30), Heft 1, S. 57-72academicJournalZugriff: