Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- computer network 1 Treffer
- cryptanalysis 1 Treffer
- cryptography 1 Treffer
- digital watermarking 1 Treffer
- domain specific language 1 Treffer
-
17 weitere Werte:
- fidelity 1 Treffer
- fuzzy integral 1 Treffer
- fuzzy measure 1 Treffer
- hill cipher 1 Treffer
- intrusion detection system 1 Treffer
- key management 1 Treffer
- malicious code 1 Treffer
- multi-core 1 Treffer
- n-grams 1 Treffer
- optimization 1 Treffer
- parallel 1 Treffer
- psnr 1 Treffer
- reliability 1 Treffer
- svm 1 Treffer
- tournament selection 1 Treffer
- visual secret sharing 1 Treffer
- wireless sensor networks 1 Treffer
Sprache
Inhaltsanbieter
10 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 173-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 269-280academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 75-86academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 267-278academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 125-132academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 405-412academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 295-304academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 161-174academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 349-360academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 125-138academicJournalZugriff: