Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- fully homomorphic encryption 7 Treffer
- cca1 3 Treffer
- computer engineering. computer hardware 3 Treffer
- electronic computers. computer science 3 Treffer
- encryption 3 Treffer
-
41 weitere Werte:
- qa75.5-76.95 3 Treffer
- tk7885-7895 3 Treffer
- acceleration 2 Treffer
- bootstrapping 2 Treffer
- data encryption -- methods 2 Treffer
- data security -- analysis 2 Treffer
- data security issue 2 Treffer
- fpga 2 Treffer
- gpu 2 Treffer
- intel corp. 2 Treffer
- ntt 2 Treffer
- obfuscation 2 Treffer
- privacy issue 2 Treffer
- 01 natural sciences 1 Treffer
- 0102 computer and information sciences 1 Treffer
- 010201 computation theory & mathematics 1 Treffer
- 02 engineering and technology 1 Treffer
- 0202 electrical engineering, electronic engineering, information engineering 1 Treffer
- 020201 artificial intelligence & image processing 1 Treffer
- artificial intelligence 1 Treffer
- business 1 Treffer
- business.industry 1 Treffer
- computer 1 Treffer
- computer networks and communications 1 Treffer
- computer science 1 Treffer
- computer.programming_language 1 Treffer
- fully 1 Treffer
- homomorphic 1 Treffer
- homomorphic encryption 1 Treffer
- identity (object-oriented programming) 1 Treffer
- information systems 1 Treffer
- key (cryptography) 1 Treffer
- lcsh:computer engineering. computer hardware 1 Treffer
- lcsh:electronic computers. computer science 1 Treffer
- lcsh:qa75.5-76.95 1 Treffer
- lcsh:tk7885-7895 1 Treffer
- probabilistic logic 1 Treffer
- public information 1 Treffer
- scheme (programming language) 1 Treffer
- software 1 Treffer
- theoretical computer science 1 Treffer
Verlag
Sprache
5 Treffer
-
In: Cybersecurity, Jg. 1 (2018-09-01), Heft 1, S. 1-8Online academicJournalZugriff:
-
In: Cybersecurity, Jg. 1 (2018-09-25), Heft 1academicJournalZugriff:
-
In: Cybersecurity, Jg. 1 (2018-09-25)Online unknownZugriff:
-
In: Cybersecurity, Jg. 7 (2024-03-01), Heft 1, S. 1-23Online academicJournalZugriff:
-
In: Cybersecurity, Jg. 7 (2024-12-01), Heft 1Online academicJournalZugriff: