Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- black hole attack 2 Treffer
- cipher text 2 Treffer
- cryptography 2 Treffer
- manet 2 Treffer
- aes 1 Treffer
-
18 weitere Werte:
- algorithmic composition 1 Treffer
- aodv 1 Treffer
- authentication 1 Treffer
- blowfish 1 Treffer
- cloud computing 1 Treffer
- cryptanalysis 1 Treffer
- des 1 Treffer
- ecc 1 Treffer
- electronic transaction 1 Treffer
- e-money 1 Treffer
- finger print 1 Treffer
- fuzzy logic 1 Treffer
- idea 1 Treffer
- iris recognition 1 Treffer
- qr code 1 Treffer
- rsa 1 Treffer
- security 1 Treffer
- verification 1 Treffer
Sprache
Inhaltsanbieter
8 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 119-124academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 353-360academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 285-294academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 55-60academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-02-28), Heft 2, S. 203-214academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 237-248academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 1-10academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 179-184academicJournalZugriff: