Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- decryption 8 Treffer
- security 6 Treffer
- authentication 4 Treffer
- cryptography 4 Treffer
- cloud computing 3 Treffer
-
45 weitere Werte:
- confidentiality 3 Treffer
- aes 2 Treffer
- black hole attack 2 Treffer
- block cipher 2 Treffer
- blowfish 2 Treffer
- cipher text 2 Treffer
- cryptanalysis 2 Treffer
- embedded security 2 Treffer
- lightweight cryptography 2 Treffer
- manet 2 Treffer
- rsa 2 Treffer
- access control 1 Treffer
- aes algorithm 1 Treffer
- algorithm 1 Treffer
- algorithmic composition 1 Treffer
- aodv 1 Treffer
- attribute based encryption 1 Treffer
- biological characteristics 1 Treffer
- boolean functions 1 Treffer
- chaos theory 1 Treffer
- clone 1 Treffer
- cryptology 1 Treffer
- data security 1 Treffer
- database 1 Treffer
- des 1 Treffer
- digital signature 1 Treffer
- dna 1 Treffer
- dns 1 Treffer
- dnssec 1 Treffer
- ecc 1 Treffer
- electronic transaction 1 Treffer
- e-money 1 Treffer
- encapsulation 1 Treffer
- facial feature 1 Treffer
- fault tolerant 1 Treffer
- finger print 1 Treffer
- fingerprinting 1 Treffer
- fuzzy logic 1 Treffer
- idea 1 Treffer
- internet of things 1 Treffer
- iot 1 Treffer
- iris recognition 1 Treffer
- led 1 Treffer
- md5 1 Treffer
- mobile agent 1 Treffer
Sprache
Inhaltsanbieter
26 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 111-128academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 315-330academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 331-340academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 327-336academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 301-310academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 119-124academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 299-308academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 85-98academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 155-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 23-34academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 353-360academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 59-70academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 285-294academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 241-246academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 35-42academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 85-94academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 55-60academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-02-28), Heft 2, S. 203-214academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 409-418academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 237-248academicJournalZugriff: