Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication 3 Treffer
- least significant bit (lsb) 2 Treffer
- robust 2 Treffer
- access control 1 Treffer
- blind 1 Treffer
-
24 weitere Werte:
- color image 1 Treffer
- dct 1 Treffer
- discrete cosine transform 1 Treffer
- document security 1 Treffer
- fpga 1 Treffer
- html 1 Treffer
- image authentication 1 Treffer
- jpeg 1 Treffer
- least significant bit 1 Treffer
- matlab 1 Treffer
- mean square error (mse) 1 Treffer
- multi-channel system 1 Treffer
- obfuscation 1 Treffer
- pattern 1 Treffer
- progressive image transmission 1 Treffer
- quaternion 1 Treffer
- reverse engineering 1 Treffer
- security 1 Treffer
- signature 1 Treffer
- simulink 1 Treffer
- software piracy 1 Treffer
- software protection 1 Treffer
- voting 1 Treffer
- xilinx system generator 1 Treffer
Sprache
Inhaltsanbieter
11 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 147-156academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 345-350academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-06-30), Heft 6, S. 315-328academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 203-216academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-04-30), Heft 4, S. 175-184academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 89-96academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 235-244academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 439-456academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 163-174academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 161-166academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 109-114academicJournalZugriff: