Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication protocol 5 Treffer
- security 5 Treffer
- hash function 3 Treffer
- internet of things 3 Treffer
- privacy 3 Treffer
-
30 weitere Werte:
- protocol 2 Treffer
- security protocol 2 Treffer
- anti-collision 1 Treffer
- authentication 1 Treffer
- block cipher 1 Treffer
- bluetooth 1 Treffer
- cloud computing 1 Treffer
- database management 1 Treffer
- drm 1 Treffer
- epc 1 Treffer
- hash 1 Treffer
- iot 1 Treffer
- labview 1 Treffer
- lagrange 1 Treffer
- mes 1 Treffer
- mobile agent 1 Treffer
- mutual authentication 1 Treffer
- ownership transfer 1 Treffer
- ownership transfer protocol 1 Treffer
- parallel processing 1 Treffer
- pedestrian safety 1 Treffer
- production 1 Treffer
- protection 1 Treffer
- random number 1 Treffer
- sample 1 Treffer
- security and privacy 1 Treffer
- security architecture 1 Treffer
- security issues 1 Treffer
- untraceability 1 Treffer
- web services 1 Treffer
Verlag
Publikation
- international journal of security and its applications 18 Treffer
- international journal of u- and e- service, science and technology 3 Treffer
- international journal of database theory and application 2 Treffer
- international journal of grid and distributed computing 1 Treffer
- international journal of signal processing, image processing and pattern recognition 1 Treffer
Inhaltsanbieter
25 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 399-408academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 9 (2016-10-30), Heft 10, S. 301-310academicJournalZugriff:
-
RFID Tag Dynamic Ownership Transfer Protocol based on Lagrange of Multi-owner with Different WeightsIn: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 185-192academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-07-30), Heft 7, S. 361-368academicJournalZugriff:
-
In: International Journal of Signal Processing, Image Processing and Pattern Recognition, Jg. 9 (2016-06-30), Heft 6, S. 121-132academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 99-106academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 369-382academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 165-174academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 201-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 211-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 209-216academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 8 (2015-03-30), Heft 3, S. 179-188academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 8 (2015-01-30), Heft 1, S. 155-164academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 225-234academicJournalZugriff:
-
In: International Journal of Database Theory and Application, Jg. 7 (2014-10-30), Heft 5, S. 133-144academicJournalZugriff:
-
In: International Journal of Database Theory and Application, Jg. 7 (2014-08-30), Heft 4, S. 249-260academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-07-30), Heft 4, S. 59-66academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 21-30academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 59-66academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 345-354academicJournalZugriff: