Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication 6 Treffer
- anonymity 3 Treffer
- biometric 3 Treffer
- key agreement 3 Treffer
- multi-server 3 Treffer
-
32 weitere Werte:
- password 3 Treffer
- user anonymity 3 Treffer
- cryptanalysis 2 Treffer
- information security 2 Treffer
- mutual authentication 2 Treffer
- network security 2 Treffer
- authenticated key exchange 1 Treffer
- authentication scheme 1 Treffer
- authentication. 1 Treffer
- control flow graph 1 Treffer
- dynamic identity 1 Treffer
- elliptic curve cryptosystem 1 Treffer
- emv 1 Treffer
- fault attack 1 Treffer
- forgery attack 1 Treffer
- fuzzy extractor 1 Treffer
- java card 1 Treffer
- key exchange 1 Treffer
- man-in-the-middle attack 1 Treffer
- model-based testing 1 Treffer
- multi-server architecture 1 Treffer
- privacy-preserving 1 Treffer
- remote authentication 1 Treffer
- remote user authentication 1 Treffer
- roaming service 1 Treffer
- security model 1 Treffer
- sysml 1 Treffer
- three-party protocol 1 Treffer
- user authentication 1 Treffer
- vulnerability 1 Treffer
- wireless network 1 Treffer
- wireless sensor network 1 Treffer
Sprache
Inhaltsanbieter
21 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 311-322academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 193-204academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-02-28), Heft 2, S. 163-170academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-01-30), Heft 1, S. 315-328academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 419-428academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-10-30), Heft 10, S. 297-312academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 367-374academicJournalZugriff:
-
An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic IdentityIn: International Journal of Security and Its Applications, Jg. 9 (2015-05-30), Heft 5, S. 255-268academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 397-408academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 127-136academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-07-30), Heft 4, S. 307-320academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-01-30), Heft 1, S. 373-388academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 335-344academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 433-444academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 119-126academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-07-30), Heft 4, S. 105-118academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 271-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-03-30), Heft 2, S. 105-116academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 261-268academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 127-132academicJournalZugriff: