Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- wireless sensor network 3 Treffer
- stream cipher 2 Treffer
- wireless sensor networks 2 Treffer
- 2d 1 Treffer
- 3d 1 Treffer
-
22 weitere Werte:
- authentication 1 Treffer
- cryptography 1 Treffer
- differential power analysis 1 Treffer
- eavesdropper 1 Treffer
- entropy 1 Treffer
- fuzzy extractor 1 Treffer
- group-key 1 Treffer
- key distribution 1 Treffer
- key management 1 Treffer
- key predistribution 1 Treffer
- location 1 Treffer
- multicast security 1 Treffer
- ns-2 1 Treffer
- ns-3 1 Treffer
- physical unclonable functions 1 Treffer
- rabbit 1 Treffer
- security 1 Treffer
- sensor networks 1 Treffer
- side channel cryptanalysis 1 Treffer
- software-defined networking 1 Treffer
- wsn 1 Treffer
- wsn security 1 Treffer
12 Treffer
-
In: 정보보호학회논문지, Jg. 32 (2022-12-31), Heft 6, S. 1165-1169academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 17 (2007-06-30), Heft 3, S. 101-107academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 25 (2015-08-31), Heft 4, S. 759-765academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 30 (2020-12-31), Heft 6, S. 975-979academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 29 (2019-02-28), Heft 1, S. 29-42academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 23 (2013-06-30), Heft 3, S. 459-469academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 21 (2011-06-30), Heft 3, S. 27-34academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 21 (2011-06-30), Heft 3, S. 75-87academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 18 (2008-12-31), Heft 6B, S. 233-247academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 18 (2008-10-31), Heft 5, S. 3-15academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 17 (2007-04-30), Heft 2, S. 125-136academicJournalZugriff:
-
In: 정보보호학회논문지, Jg. 17 (2007-08-31), Heft 4, S. 37-45academicJournalZugriff: