Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- encryption 4 Treffer
- cloud computing 3 Treffer
- hill cipher 3 Treffer
- aes 2 Treffer
- cellular automata 2 Treffer
-
45 weitere Werte:
- cipher text 2 Treffer
- cryptanalysis 2 Treffer
- decryption 2 Treffer
- algorithm 1 Treffer
- anonymity 1 Treffer
- association rules 1 Treffer
- authentication 1 Treffer
- binary particle swarm optimization 1 Treffer
- blowfish 1 Treffer
- confusion 1 Treffer
- copyright protection 1 Treffer
- cryptology 1 Treffer
- des 1 Treffer
- diffusion 1 Treffer
- digital watermarking 1 Treffer
- distributed computation 1 Treffer
- distributed database 1 Treffer
- ecc 1 Treffer
- elliptic curves 1 Treffer
- forward security 1 Treffer
- genetic algorithm 1 Treffer
- hardware complexity 1 Treffer
- hash function 1 Treffer
- hash functions 1 Treffer
- homomorphic encryption 1 Treffer
- idea 1 Treffer
- information security 1 Treffer
- internet of things 1 Treffer
- keccak 1 Treffer
- key agreement 1 Treffer
- medical data 1 Treffer
- network security 1 Treffer
- nist 1 Treffer
- obfuscation 1 Treffer
- pki 1 Treffer
- pseudo-random number generator 1 Treffer
- rotation 1 Treffer
- rsa 1 Treffer
- secret sharing 1 Treffer
- security 1 Treffer
- security measure 1 Treffer
- statistical tests 1 Treffer
- tracking 1 Treffer
- vpn 1 Treffer
- wireless mesh networks 1 Treffer
Sprache
Inhaltsanbieter
20 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 109-118academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 169-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 9-18academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 173-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 327-336academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 353-360academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 241-246academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 55-60academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 41-48academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 387-396academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 363-376academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 241-248academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 303-316academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-10-30), Heft 4, S. 13-24academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 115-120academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 1-12academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-01-30), Heft 1, S. 1-8academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 5 (2011-10-30), Heft 4, S. 123-132academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 5 (2011-01-30), Heft 1, S. 1-12academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 3 (2009-07-30), Heft 3, S. 23-33academicJournalZugriff: