Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- e-commerce 2 Treffer
- linux 2 Treffer
- aes 1 Treffer
- blowfish 1 Treffer
- collaborative learning 1 Treffer
-
15 weitere Werte:
- dea model 1 Treffer
- ecc 1 Treffer
- embedded systems 1 Treffer
- hardware security 1 Treffer
- hash functions 1 Treffer
- java 1 Treffer
- lsm 1 Treffer
- network platform 1 Treffer
- pe teachers 1 Treffer
- public cultural service 1 Treffer
- rural tourism 1 Treffer
- secure os 1 Treffer
- security test 1 Treffer
- sha-3 1 Treffer
- web survey 1 Treffer
Sprache
Inhaltsanbieter
9 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 355-366academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 21-30academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 353-370academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 231-242academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 289-304academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 1-16academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 231-242academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-01-30), Heft 1, S. 163-168academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 81-90academicJournalZugriff: