Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- rsa 51 Treffer
- cryptography 48 Treffer
- data encryption 27 Treffer
- digital signatures 20 Treffer
- digital signature 19 Treffer
-
45 weitere Werte:
- proxy signature 17 Treffer
- computer security 15 Treffer
- rsa cryptosystem 15 Treffer
- artificial intelligence 14 Treffer
- computer science applications 14 Treffer
- control and systems engineering 14 Treffer
- information systems and management 14 Treffer
- software 14 Treffer
- theoretical computer science 14 Treffer
- computer science 13 Treffer
- public-key cryptography 13 Treffer
- cloud computing 12 Treffer
- data security 12 Treffer
- public key cryptography 12 Treffer
- rsa algorithm 12 Treffer
- security 11 Treffer
- business 10 Treffer
- business.industry 10 Treffer
- information theory 9 Treffer
- computer 8 Treffer
- cryptanalysis 8 Treffer
- 02 engineering and technology 7 Treffer
- 0202 electrical engineering, electronic engineering, information engineering 7 Treffer
- authenticated encryption 7 Treffer
- computer.software_genre 7 Treffer
- cryptosystems 7 Treffer
- information science 7 Treffer
- mathematics 7 Treffer
- public key encryption 7 Treffer
- side channel attacks 7 Treffer
- speedup 7 Treffer
- threshold proxy signature 7 Treffer
- timing attack 7 Treffer
- 020201 artificial intelligence & image processing 6 Treffer
- computational complexity 6 Treffer
- cyberterrorism 6 Treffer
- data protection 6 Treffer
- equality test 6 Treffer
- error detection 6 Treffer
- fault tolerance 6 Treffer
- information sharing 6 Treffer
- linear systems 6 Treffer
- proxy statements 6 Treffer
- random oracle model 6 Treffer
- scheme programming language 6 Treffer
Verlag
Sprache
152 Treffer
-
In: Information Sciences, Jg. 538 (2020-10-01), S. 54-68Online academicJournal
-
In: Information Sciences, Jg. 512 (2020-02-01), S. 471-480Online academicJournal
-
In: Information Sciences, Jg. 412-413 (2017-10-01), S. 36-49Online academicJournal
-
In: Information Sciences, Jg. 387 (2017-05-01), S. 254-265Online academicJournal
-
In: Information Sciences, Jg. 363 (2016-10-01), S. 140-153Online academicJournal
-
In: Information Sciences, Jg. 278 (2014-09-10), S. 577-587Online academicJournal
-
In: Information Sciences, Jg. 232 (2013-05-20), S. 464-474Online academicJournal
-
In: Information Sciences, Jg. 512 (2020-02-01), S. 471-480Online unknownZugriff:
-
In: Information Sciences, Jg. 177 (2007), Heft 19, S. 4031-4039Online academicJournal
-
In: Information Sciences, Jg. 160 (2004), Heft 1, S. 225-233Online academicJournal
-
Dieser Titel kann aus lizenzrechtlichen Gründen nur im Campusnetz oder nach Anmeldung angezeigt werden!academicJournalZugriff:
-
In: Information Sciences, 2017-10-01, S. 36-49Online unknownZugriff:
-
In: Information Sciences, Jg. 387 (2017-05-01), S. 254-265Online unknownZugriff:
-
In: Information Sciences, Jg. 278 (2014-09-01), S. 577-587Online unknownZugriff:
-
In: Information Sciences, Jg. 379 (2017-02-10), S. 257-273Online serialPeriodical
-
In: Information Sciences, Jg. 232 (2013-05-01), S. 464-474Online unknownZugriff:
-
In: Information Sciences, Jg. 160 (2004-03-01), S. 225-233Online unknownZugriff:
-
In: Information Sciences, Jg. 177 (2007-10-01), S. 4031-4039Online unknownZugriff:
-
In: Information Sciences, Jg. 227 (2013-04-01), S. 102-115Online unknownZugriff:
-
In: Information Sciences, 2015Online academicJournal