Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- authentication 2 Treffer
- key management 2 Treffer
- security 2 Treffer
- ant colony optimization 1 Treffer
- attack 1 Treffer
-
20 weitere Werte:
- blowfish 1 Treffer
- cbc 1 Treffer
- confidentiality 1 Treffer
- cross layer 1 Treffer
- des 1 Treffer
- energy consumption 1 Treffer
- event-driven 1 Treffer
- information security 1 Treffer
- integrity 1 Treffer
- internet of things 1 Treffer
- intrusion prevention 1 Treffer
- mac protocol 1 Treffer
- multi-hop 1 Treffer
- particle swarm optimization 1 Treffer
- password 1 Treffer
- polynomial 1 Treffer
- session key 1 Treffer
- sinkhole attack 1 Treffer
- smart card 1 Treffer
- swarm intelligence 1 Treffer
Sprache
Inhaltsanbieter
8 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 219-228academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 365-374academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 295-302academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-07-30), Heft 7, S. 119-134academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 41-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 55-62academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-08-30), Heft 8, S. 367-374academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-01-30), Heft 1, S. 57-72academicJournalZugriff: