Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication protocol 5 Treffer
- security 5 Treffer
- hash function 3 Treffer
- privacy 3 Treffer
- internet of things 2 Treffer
-
18 weitere Werte:
- protocol 2 Treffer
- security protocol 2 Treffer
- anti-collision 1 Treffer
- authentication 1 Treffer
- block cipher 1 Treffer
- epc 1 Treffer
- hash 1 Treffer
- iot 1 Treffer
- lagrange 1 Treffer
- mobile agent 1 Treffer
- mutual authentication 1 Treffer
- ownership transfer 1 Treffer
- ownership transfer protocol 1 Treffer
- parallel processing 1 Treffer
- random number 1 Treffer
- sample 1 Treffer
- security issues 1 Treffer
- untraceability 1 Treffer
Sprache
Inhaltsanbieter
18 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 399-408academicJournalZugriff:
-
RFID Tag Dynamic Ownership Transfer Protocol based on Lagrange of Multi-owner with Different WeightsIn: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 185-192academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 99-106academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 369-382academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-12-30), Heft 12, S. 165-174academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 201-208academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 211-220academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 209-216academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 225-234academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-07-30), Heft 4, S. 59-66academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-05-30), Heft 3, S. 21-30academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 59-66academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 345-354academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 43-52academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 37-50academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 183-194academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 91-102academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 2 (2008-10-30), Heft 4, S. 57-66academicJournalZugriff: