Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication 2 Treffer
- rfid 2 Treffer
- security 2 Treffer
- access control 1 Treffer
- attribute based encryption 1 Treffer
-
21 weitere Werte:
- attribute-based encryption 1 Treffer
- bayesian network 1 Treffer
- context-aware 1 Treffer
- cryptography 1 Treffer
- digital door lock 1 Treffer
- digital forensics 1 Treffer
- encoder 1 Treffer
- encryption 1 Treffer
- epc 1 Treffer
- fpga 1 Treffer
- incident response 1 Treffer
- integrity 1 Treffer
- obfuscation 1 Treffer
- pre-shared key 1 Treffer
- reconfiguration 1 Treffer
- secure bootstrapping 1 Treffer
- security protocol 1 Treffer
- session key 1 Treffer
- trust management 1 Treffer
- web of things 1 Treffer
- wireless sensor network 1 Treffer
Sprache
Inhaltsanbieter
12 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 165-174academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 169-180academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 365-374academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 13-22academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 13-22academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 385-414academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 23-34academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 201-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 45-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 271-278academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 39-48academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 91-102academicJournalZugriff: