Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- dpa 140 Treffer
- cryptography 88 Treffer
- applied sciences 62 Treffer
- computer science 62 Treffer
- exact sciences and technology 62 Treffer
-
45 weitere Werte:
- informatique 62 Treffer
- sciences appliquees 62 Treffer
- sciences exactes et technologie 62 Treffer
- cryptographie 55 Treffer
- information, signal and communications theory 49 Treffer
- signal and communications theory 49 Treffer
- telecommunications and information theory 49 Treffer
- telecommunications et theorie de l'information 49 Treffer
- theorie de l'information, du signal et des communications 49 Treffer
- theorie du signal et des communications 49 Treffer
- criptografia 46 Treffer
- cryptanalysis 45 Treffer
- parallel processing (electronic computers) 44 Treffer
- computer security 43 Treffer
- criptoanalisis 43 Treffer
- cryptanalyse 43 Treffer
- euro par 43 Treffer
- hppc 43 Treffer
- proper 43 Treffer
- roia 43 Treffer
- sgs 43 Treffer
- unicore 43 Treffer
- vhpc 43 Treffer
- smart cards 41 Treffer
- power analysis 38 Treffer
- computer science; control theory; systems 35 Treffer
- informatique; automatique theorique; systemes 35 Treffer
- logiciel 35 Treffer
- software 35 Treffer
- masking 31 Treffer
- memory organisation. data processing 29 Treffer
- organisation des memoires. traitement des donnees 29 Treffer
- safety 29 Treffer
- securite 29 Treffer
- seguridad 29 Treffer
- aes 28 Treffer
- carte a puce 28 Treffer
- contra medida electronica 26 Treffer
- contre mesure electronique 26 Treffer
- electronic countermeasure 26 Treffer
- integrated circuits 26 Treffer
- gestion des memoires et des fichiers (y compris la protection et la securite des fichiers) 25 Treffer
- memory and file management (including protection and security) 25 Treffer
- side channel attack 24 Treffer
- boarded computer 23 Treffer
Verlag
- springer verlag 149 Treffer
- springer 82 Treffer
- springer-verlag 65 Treffer
- berlin; springer; c 56 Treffer
- springer science and business media deutschland gmbh 12 Treffer
-
11 weitere Werte:
- berlin; springer 11 Treffer
- cham; springer 9 Treffer
- berlin; [london]; springer; c 8 Treffer
- berlin; london; springer 7 Treffer
- heidelberg; springer 4 Treffer
- heidelberg; springer; c 4 Treffer
- new york; springer 4 Treffer
- berlin; [great britain]; springer; c 1 Treffer
- berlin; [london]; springer 1 Treffer
- berlin; london:; springer 1 Treffer
- berlin; springer; 2005.; [great britain] : 1 Treffer
Publikation
- euro-par 2008 workshops - parallel processing - vhpc 2008, unicore 2008, hppc 2008, sgs 2008, proper 2008, roia 2008, and dpa 2008, revised selected papers 47 Treffer
- cryptographic hardware and embedded systems - ches 2005 (edinburgh, 29 august - 1 september 2005) 10 Treffer
- cryptographic hardware and embedded systems - ches 2001 - 3rd international workshop, proceedings 6 Treffer
- cryptographic hardware and embedded systems - ches 2007 - 9th international workshop, proceedings 6 Treffer
- ches 2001 : cryptographic hardware and embedded systems (paris, 14-16 may 2001) 5 Treffer
-
45 weitere Werte:
- ches 2002 : cryptographic hardware and embedded systems (redwood shores, 13-15 august 2002, revised papers) 5 Treffer
- ches 2003 : cryptographic hardware and embedded systems (cologne, 8-10 september 2003) 5 Treffer
- ches 2004 : cryptographic hardware and embedded systems (cambridge ma, 11-13 august 2004) 5 Treffer
- cryptographic hardware and embedded systems, ches 2006 - 8th international workshop, proceedings 5 Treffer
- cryptographic hardware and embedded systems, ches 2012 - 14th international workshop, proceedings 5 Treffer
- artificial intelligence in medicine - 9th conference on artificial intelligence in medicine in europe, aime 2003, proceedings 3 Treffer
- constructive side-channel analysis and secure design - third international workshop, cosade 2012, proceedings 3 Treffer
- cryptographic hardware and embedded systems - 17th international workshop, ches 2015, proceedings 3 Treffer
- cryptographic hardware and embedded systems - ches 2008 - 10th international workshop, proceedings 3 Treffer
- cryptographic hardware and embedded systems - ches 2009 - 11th international workshop, proceedings 3 Treffer
- information and communications security (malaga, 27-29 october 2004) 3 Treffer
- smart card research and advanced applications - 10th ifip wg 8.8/11.2 international conference, cardis 2011, revised selected papers 3 Treffer
- applied cryptography and network security - 4th international conference, acns 2006, proceedings 2 Treffer
- ches'99 : cryptographic hardware and embedded systems (worcester ma, 12-13 august 1999) 2 Treffer
- constructive side-channel analysis and secure design - 5th international workshop, cosade 2014, revised selected papers 2 Treffer
- constructive side-channel analysis and secure design - 6th international workshop, cosade 2015, revised selected papers 2 Treffer
- constructive side-channel analysis and secure design - 7th international workshop, cosade 2016, revised selected papers 2 Treffer
- constructive side-channel analysis and secure design - 9th international workshop, cosade 2018, proceedings 2 Treffer
- cryptographic hardware and embedded systems - 13th international workshop, ches 2011, proceedings 2 Treffer
- cryptographic hardware and embedded systems - ches 2000 - second international workshop, proceedings 2 Treffer
- cryptographic hardware and embedded systems, ches 2013 - 15th international workshop, proceedings 2 Treffer
- ct-rsa 2004 : topics in cryptology (san francisco ca, 23-27 february 2004) 2 Treffer
- information security and privacy (sydney, 13-15 july 2004) 2 Treffer
- information security applications (jeju island, 25-27 august 2003, revised papers) 2 Treffer
- cryptography and coding (cirencester, 17-19 december 2001 ) 1 Treffer
- fpl 2004 : field-programmable logic and applications (antwerp, 30 august - 1 september 2004) 1 Treffer
- fse 2003 : fast software encryption (lund, 24-26 february 2003, revised papers) 1 Treffer
- fse 2004 : fast software encryption (delhi, 5-7 february 2004, revised papers) 1 Treffer
- fse 2005 : fast software encryption (paris, 21-23 february 2005, revised selected papers) 1 Treffer
- icisc 2003 : information security and cryptology (seoul, 27-28 november 203, revised papers) 1 Treffer
- information security (malaga, 1-3 october 2001) 1 Treffer
- information security (sao paulo, 30 september - 2 october 2002) 1 Treffer
- information security and cryptology - icisc 2002 (seoul, 28-29 november 2002, revised papers) 1 Treffer
- information security and cryptology (seoul, 6-7 december 2001) 1 Treffer
- information security and privacy (brisbane, 4-6 july 2005) 1 Treffer
- information security and privacy (wollongong, 9-11 july 2003) 1 Treffer
- integrated circuit and system design (power and timing modeling, optimization and simulation) 1 Treffer
- integrated spatial databases : digital images and gis (portland me, 14-16 june 1999, selected papers) 1 Treffer
- isc 2003 : information security (bristol, 1-3 october 2003) 1 Treffer
- ispec 2005 : information security practice and experience (singapore, 11-14 april 2005) 1 Treffer
- pkc 2003 : public key cryptography (miami fl, 6-8 january 2003) 1 Treffer
- progress in cryptology - mycrypt 2005 (1st international conference on cryptology in malaysia, kuala lumpur, malaysia, september 28-30, 2005) 1 Treffer
- sac 2003 : selected areas in cryptography (ottawa on, 14-15 august 2003, revised papers) 1 Treffer
- topics in cryptology - ct-rsa 2005 (san francisco ca, 14-18 february 2005) 1 Treffer
- wwic 2004 : wired/wireless internet communications (frankfurt (oder), 4-6 february 2004) 1 Treffer
Sprache
Geographischer Bezug
555 Treffer
-
In: Lecture notes in computer science, Jg. 13211 (2022), S. 193-214KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 12472 (2020), S. 95-106KonferenzZugriff:
-
Dieser Titel kann aus lizenzrechtlichen Gründen nur im Campusnetz oder nach Anmeldung angezeigt werden!BuchZugriff:
-
In: Lecture notes in computer science, Jg. 11769 (2019), S. 139-147KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 10815 (2018), S. 207-226KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 10631 (2018), S. 225-235KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 10728 (2018), S. 42-50KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 10719 (2018), S. 442-458KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 10348 (2017), S. 50-64KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 10076 (2016), S. 179-193KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 9543 (2016), S. 184-198KonferenzZugriff:
-
In: LECTURE NOTES IN COMPUTER SCIENCE, 2014, Heft 8873, S. 243-261KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 9453 (2015), S. 291-312KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 9408 (2015), S. 316-330KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 9293 (2015), S. 599-619KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 9293 (2015), S. 3-21KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 9293 (2015), S. 416-432KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 9064 (2015), S. 222-238KonferenzZugriff:
-
In: Lecture notes in computer science, Jg. 9064 (2015), S. 34-50KonferenzZugriff:
-
In: LECTURE NOTES IN COMPUTER SCIENCE, 2014, Heft 8885, S. 374-392KonferenzZugriff: