Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- decryption 10 Treffer
- security 10 Treffer
- authentication 6 Treffer
- cloud computing 5 Treffer
- cryptography 5 Treffer
-
45 weitere Werte:
- confidentiality 3 Treffer
- aes 2 Treffer
- aes algorithm 2 Treffer
- black hole attack 2 Treffer
- block cipher 2 Treffer
- blowfish 2 Treffer
- cipher text 2 Treffer
- cryptanalysis 2 Treffer
- digital image 2 Treffer
- digital signature 2 Treffer
- embedded security 2 Treffer
- image processing 2 Treffer
- lightweight cryptography 2 Treffer
- manet 2 Treffer
- rsa 2 Treffer
- signature 2 Treffer
- steganography 2 Treffer
- access control 1 Treffer
- algorithm 1 Treffer
- algorithmic composition 1 Treffer
- aodv 1 Treffer
- artificial neural network. 1 Treffer
- attribute based encryption 1 Treffer
- biological characteristics 1 Treffer
- boolean functions 1 Treffer
- chaos 1 Treffer
- chaos theory 1 Treffer
- clone 1 Treffer
- cryptology 1 Treffer
- cycle 1 Treffer
- data hiding 1 Treffer
- data security 1 Treffer
- database 1 Treffer
- des 1 Treffer
- discreteness 1 Treffer
- dna 1 Treffer
- dns 1 Treffer
- dnssec 1 Treffer
- ecc 1 Treffer
- electronic transaction 1 Treffer
- e-money 1 Treffer
- encapsulation 1 Treffer
- facial feature 1 Treffer
- fault tolerant 1 Treffer
- finger print 1 Treffer
Verlag
Publikation
- international journal of security and its applications 26 Treffer
- international journal of grid and distributed computing 4 Treffer
- international journal of signal processing, image processing and pattern recognition 4 Treffer
- international journal of u- and e- service, science and technology 4 Treffer
- international journal of database theory and application 1 Treffer
Inhaltsanbieter
39 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 111-128academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-07-30), Heft 7, S. 121-130academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 315-330academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 331-340academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 327-336academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 301-310academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 119-124academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 299-308academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 85-98academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 8 (2015-12-30), Heft 6, S. 9-18academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 155-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 23-34academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 353-360academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 59-70academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 285-294academicJournalZugriff:
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 8 (2015-07-30), Heft 7, S. 161-170academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 241-246academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 35-42academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 85-94academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 55-60academicJournalZugriff: