Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 12 Treffer
- authentication 5 Treffer
- cloud computing 3 Treffer
- rfid 3 Treffer
- authentication protocol 2 Treffer
-
45 weitere Werte:
- sns 2 Treffer
- trust 2 Treffer
- access control 1 Treffer
- agent 1 Treffer
- android 1 Treffer
- anonymity 1 Treffer
- anonymous 1 Treffer
- auditing 1 Treffer
- autonomy 1 Treffer
- biological characteristics 1 Treffer
- bus information system 1 Treffer
- collective intelligence 1 Treffer
- database 1 Treffer
- decision tree 1 Treffer
- de-identification 1 Treffer
- digital forensics 1 Treffer
- e-commerce 1 Treffer
- e-healthcare 1 Treffer
- encryption 1 Treffer
- fintech 1 Treffer
- forensics 1 Treffer
- fuzzy set 1 Treffer
- handover 1 Treffer
- hash function 1 Treffer
- heterogeneity 1 Treffer
- identity authentication 1 Treffer
- integrity 1 Treffer
- k-anonymity 1 Treffer
- location based services 1 Treffer
- management 1 Treffer
- m-learning 1 Treffer
- mobile p2p 1 Treffer
- mobile payment 1 Treffer
- online social network 1 Treffer
- ontology 1 Treffer
- patent analysis 1 Treffer
- personally identifiable information 1 Treffer
- policy 1 Treffer
- qr code 1 Treffer
- risk assessment 1 Treffer
- security framework 1 Treffer
- security protocol 1 Treffer
- service-oriented 1 Treffer
- smart cities 1 Treffer
- social networking service 1 Treffer
Verlag
Publikation
Inhaltsanbieter
28 Treffer
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-09-30), Heft 9, S. 55-64academicJournalZugriff:
-
In: International Journal of Database Theory and Application, Jg. 9 (2016-06-30), Heft 6, S. 103-108academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 41-56academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 171-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 265-276academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 175-196academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 211-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 53-62academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 113-120academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 205-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 225-234academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 51-60academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 361-376academicJournalZugriff:
-
In: International Journal of Database Theory and Application, Jg. 7 (2014-06-30), Heft 3, S. 121-130academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 143-152academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 79-86academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 7 (2014-04-30), Heft 2, S. 263-274academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 139-146academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 97-104academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 37-50academicJournalZugriff: