Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- mobile network 2 Treffer
- password 2 Treffer
- quantum cryptography 2 Treffer
- quantum key distribution 2 Treffer
- security protocols 2 Treffer
-
45 weitere Werte:
- smart card 2 Treffer
- academic achievement 1 Treffer
- access control 1 Treffer
- assessment indices 1 Treffer
- attribute-based encryption 1 Treffer
- authentication 1 Treffer
- bayesian network 1 Treffer
- capacity 1 Treffer
- cloud computing service 1 Treffer
- confusion 1 Treffer
- converged security 1 Treffer
- cryptography 1 Treffer
- cyber security 1 Treffer
- diffusion 1 Treffer
- e-commerce 1 Treffer
- edutainment 1 Treffer
- event correlation 1 Treffer
- feedback 1 Treffer
- information security management systems 1 Treffer
- item response theory 1 Treffer
- key agreement 1 Treffer
- klt 1 Treffer
- learning contents 1 Treffer
- least significant bit 1 Treffer
- moving target defense 1 Treffer
- multi-server architecture 1 Treffer
- network security 1 Treffer
- physical security 1 Treffer
- privacy protection 1 Treffer
- qkd 1 Treffer
- random selection 1 Treffer
- rotation 1 Treffer
- secret sharing 1 Treffer
- sensitive information 1 Treffer
- simulation 1 Treffer
- simulation game 1 Treffer
- situation assessment 1 Treffer
- smart appliances 1 Treffer
- smart phones 1 Treffer
- sng 1 Treffer
- sns 1 Treffer
- steganography 1 Treffer
- the internet of things 1 Treffer
- tourism information 1 Treffer
- trust 1 Treffer
Sprache
Inhaltsanbieter
22 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 283-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 37-46academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 229-238academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 165-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 119-128academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 129-138academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 415-426academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 45-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 77-94academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 367-374academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 319-334academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 147-160academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 127-136academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 137-146academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 21-30academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 377-386academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 205-214academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-01-30), Heft 1, S. 143-154academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-10-30), Heft 4, S. 67-76academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 261-268academicJournalZugriff: