Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- cloud computing 5 Treffer
- security 5 Treffer
- e-commerce 3 Treffer
- access control 2 Treffer
- authentication 2 Treffer
-
45 weitere Werte:
- privacy 2 Treffer
- privacy protection 2 Treffer
- qos 2 Treffer
- reputation 2 Treffer
- satisfaction 2 Treffer
- analytic hierarchy 1 Treffer
- autonomy 1 Treffer
- cloud security 1 Treffer
- communication tools 1 Treffer
- conflict management 1 Treffer
- control 1 Treffer
- cooperative performance 1 Treffer
- data privacy 1 Treffer
- data security 1 Treffer
- diffusion 1 Treffer
- dynamic game 1 Treffer
- fairness 1 Treffer
- faithfulness 1 Treffer
- heap 1 Treffer
- heterogeneity 1 Treffer
- hmr 1 Treffer
- information security 1 Treffer
- information theory 1 Treffer
- keys 1 Treffer
- knowledge trading 1 Treffer
- load prediction 1 Treffer
- loyalty 1 Treffer
- malicious attack 1 Treffer
- mmkp 1 Treffer
- mobile p2p 1 Treffer
- mobile payment 1 Treffer
- model 1 Treffer
- multi-domain 1 Treffer
- network latency 1 Treffer
- quality of service 1 Treffer
- relationship commitment 1 Treffer
- reliability 1 Treffer
- risk 1 Treffer
- role performance 1 Treffer
- routing protocol 1 Treffer
- scheduling algorithm 1 Treffer
- seriousness 1 Treffer
- service failure 1 Treffer
- shopping orientation 1 Treffer
- similarity 1 Treffer
Verlag
Publikation
Inhaltsanbieter
24 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 283-288academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 153-172academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-11-30), Heft 11, S. 263-274academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 187-200academicJournalZugriff:
-
In: International Journal of Database Theory and Application, Jg. 9 (2016-08-30), Heft 8, S. 193-200academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-06-30), Heft 6, S. 295-310academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-04-30), Heft 4, S. 175-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 63-70academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 9 (2016-03-31), Heft 3, S. 341-350academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 9 (2016-01-30), Heft 1, S. 99-104academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 8 (2015-08-30), Heft 8, S. 333-342academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 8 (2015-07-30), Heft 7, S. 251-258academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 107-116academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 113-120academicJournalZugriff:
-
In: International Journal of u- and e- Service, Science and Technology, Jg. 8 (2015-01-30), Heft 1, S. 117-130academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 375-388academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 149-160academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 7 (2014-04-30), Heft 2, S. 89-98academicJournalZugriff:
-
In: International Journal of Grid and Distributed Computing, Jg. 6 (2013-06-30), Heft 3, S. 29-42academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 259-270academicJournalZugriff: