Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- performance evaluation 2 Treffer
- agent 1 Treffer
- anonymous 1 Treffer
- collaborative learning 1 Treffer
- college student 1 Treffer
-
21 weitere Werte:
- economic development 1 Treffer
- enterprise performance 1 Treffer
- hash chain 1 Treffer
- information leakage 1 Treffer
- information security 1 Treffer
- internet platform 1 Treffer
- logistics distribution center 1 Treffer
- marketing strategy 1 Treffer
- network marketing 1 Treffer
- network platform 1 Treffer
- one-way hash function 1 Treffer
- pe teachers 1 Treffer
- privacy 1 Treffer
- regional economy 1 Treffer
- regression model 1 Treffer
- risk management 1 Treffer
- rural tourism 1 Treffer
- security 1 Treffer
- security control 1 Treffer
- security issues 1 Treffer
- trust 1 Treffer
Sprache
Inhaltsanbieter
13 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 271-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 65-74academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 21-30academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 413-424academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 323-332academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 287-296academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 275-286academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 231-242academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 319-334academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 153-162academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 143-152academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 283-290academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 4 (2010-04-30), Heft 2, S. 39-48academicJournalZugriff: