Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication 16 Treffer
- privacy 12 Treffer
- encryption 10 Treffer
- cloud computing 9 Treffer
- access control 6 Treffer
-
45 weitere Werte:
- rfid 5 Treffer
- trust 5 Treffer
- authentication protocol 4 Treffer
- hash function 4 Treffer
- steganography 4 Treffer
- aes 3 Treffer
- detection 3 Treffer
- key management 3 Treffer
- policy 3 Treffer
- risk 3 Treffer
- utaut 3 Treffer
- wireless sensor network 3 Treffer
- wireless sensor networks 3 Treffer
- agent 2 Treffer
- algorithm 2 Treffer
- analysis 2 Treffer
- anonymity 2 Treffer
- attack 2 Treffer
- behavioral intention 2 Treffer
- big data 2 Treffer
- block cipher 2 Treffer
- blowfish 2 Treffer
- challenges 2 Treffer
- cryptography 2 Treffer
- data hiding 2 Treffer
- decryption 2 Treffer
- digital image 2 Treffer
- digital signature 2 Treffer
- e-government 2 Treffer
- e-procurement 2 Treffer
- internet of things 2 Treffer
- manets 2 Treffer
- mobile agent 2 Treffer
- model 2 Treffer
- online service 2 Treffer
- operating system 2 Treffer
- password 2 Treffer
- performance 2 Treffer
- phishing 2 Treffer
- privacy protection 2 Treffer
- quantum authentication 2 Treffer
- qubit 2 Treffer
- rbac 2 Treffer
- risk assessment 2 Treffer
- risk management 2 Treffer
Verlag
Publikation
- international journal of security and its applications 119 Treffer
- international journal of u- and e- service, science and technology 9 Treffer
- international journal of grid and distributed computing 8 Treffer
- international journal of database theory and application 3 Treffer
- international journal of signal processing, image processing and pattern recognition 3 Treffer
Inhaltsanbieter
142 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 261-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 229-240academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 43-52academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 79-88academicJournalZugriff:
-
Secure Wireless Body Area Network (WBAN) Communication Method Using New Random Key Management SchemeIn: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 13-22academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-10-30), Heft 10, S. 435-444academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-10-30), Heft 10, S. 181-186academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 261-270academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 57-66academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 107-118academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 67-76academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 13-20academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-09-30), Heft 9, S. 55-64academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 211-228academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 9 (2016-09-30), Heft 9, S. 205-212academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 295-302academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 131-144academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 39-48academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 9 (2016-08-30), Heft 8, S. 371-384academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 259-268academicJournalZugriff: