Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- authentication 9 Treffer
- security 5 Treffer
- smart card 4 Treffer
- anonymity 3 Treffer
- rfid 3 Treffer
-
45 weitere Werte:
- man-in-the-middle attack 2 Treffer
- mitm 2 Treffer
- multi-server 2 Treffer
- protocol 2 Treffer
- video analytics 2 Treffer
- we would like to encourage you to list your keywords in this section 2 Treffer
- aco 1 Treffer
- anonymous 1 Treffer
- anonymous communication 1 Treffer
- attack and defense strategy 1 Treffer
- attack detection 1 Treffer
- attack model 1 Treffer
- authentication scheme 1 Treffer
- biometric 1 Treffer
- biometrics 1 Treffer
- bluetooth 1 Treffer
- certificateless public key cryptography 1 Treffer
- confidentiality 1 Treffer
- cryptography 1 Treffer
- data mining 1 Treffer
- denial of service 1 Treffer
- diffie-hellman 1 Treffer
- dnssec 1 Treffer
- dos 1 Treffer
- dynamic id 1 Treffer
- ecc 1 Treffer
- encapsulation 1 Treffer
- encryption 1 Treffer
- feature extraction 1 Treffer
- forgery attack 1 Treffer
- game theory 1 Treffer
- hacker 1 Treffer
- hummingbird-2 1 Treffer
- identification 1 Treffer
- impersonation attack 1 Treffer
- integrated surveillance system 1 Treffer
- intrusion detection 1 Treffer
- iris recognition 1 Treffer
- kdp 1 Treffer
- key agreement 1 Treffer
- key establishment 1 Treffer
- key exchange 1 Treffer
- key management 1 Treffer
- lightweight 1 Treffer
- low power consumption 1 Treffer
35 Treffer
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-08-30), Heft 8, S. 145-150academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 1-8academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 311-322academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-10-30), Heft 10, S. 119-134academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 143-152academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 69-78academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-03-30), Heft 3, S. 99-112academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-12-30), Heft 6, S. 115-126academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 437-442academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 427-430academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 217-222academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 4 (2010-01-30), Heft 1, S. 49-67academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 265-274academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-09-30), Heft 5, S. 11-20academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 79-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-01-30), Heft 1, S. 397-408academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-07-30), Heft 3, S. 45-54academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 399-408academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 275-284academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-06-30), Heft 6, S. 331-340academicJournalZugriff: