Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- security 8 Treffer
- authentication 4 Treffer
- rfid 3 Treffer
- authentication protocol 2 Treffer
- cloud computing 2 Treffer
-
37 weitere Werte:
- trust 2 Treffer
- access control 1 Treffer
- agent 1 Treffer
- android 1 Treffer
- anonymity 1 Treffer
- anonymous 1 Treffer
- autonomy 1 Treffer
- biological characteristics 1 Treffer
- bus information system 1 Treffer
- collective intelligence 1 Treffer
- database 1 Treffer
- de-identification 1 Treffer
- digital forensics 1 Treffer
- e-commerce 1 Treffer
- e-healthcare 1 Treffer
- encryption 1 Treffer
- forensics 1 Treffer
- handover 1 Treffer
- hash function 1 Treffer
- heterogeneity 1 Treffer
- k-anonymity 1 Treffer
- location based services 1 Treffer
- mobile p2p 1 Treffer
- ontology 1 Treffer
- personally identifiable information 1 Treffer
- policy 1 Treffer
- qr code 1 Treffer
- risk assessment 1 Treffer
- security framework 1 Treffer
- security protocol 1 Treffer
- smart cities 1 Treffer
- sns 1 Treffer
- social networking sites 1 Treffer
- sybil attack 1 Treffer
- two-factor authentication 1 Treffer
- vehicular ad-hoc networks 1 Treffer
- wimax 1 Treffer
Sprache
Inhaltsanbieter
20 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-05-30), Heft 5, S. 41-56academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 171-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 265-276academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 175-196academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 211-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 53-62academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 113-120academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 205-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 225-234academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 51-60academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 361-376academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 143-152academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 79-86academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 139-146academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 97-104academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 37-50academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 241-244academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 185-190academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 5 (2011-04-30), Heft 2, S. 1-16academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 1 (2007-07-30), Heft 1, S. 57-71academicJournalZugriff: