Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- computer security 40 Treffer
- cryptography 38 Treffer
- data encryption 35 Treffer
- public key cryptography 30 Treffer
- digital signatures 25 Treffer
-
45 weitere Werte:
- rsa algorithm 24 Treffer
- algorithms 16 Treffer
- computer algorithms 15 Treffer
- computer software 13 Treffer
- rsa data security inc. 12 Treffer
- computer software industry 11 Treffer
- national institute of standards & technology (u.s.) 10 Treffer
- security systems 10 Treffer
- authentication (law) 9 Treffer
- computer network security 9 Treffer
- cryptosystems 8 Treffer
- elliptic curve cryptography 8 Treffer
- elliptic curves 8 Treffer
- internet 8 Treffer
- applied sciences 7 Treffer
- computer science 7 Treffer
- data security 7 Treffer
- exact sciences and technology 7 Treffer
- informatique 7 Treffer
- rsa 7 Treffer
- sciences appliquees 7 Treffer
- sciences exactes et technologie 7 Treffer
- software 7 Treffer
- cloud computing 6 Treffer
- computer science; control theory; systems 6 Treffer
- hardware 6 Treffer
- informatique; automatique theorique; systemes 6 Treffer
- parallel processing 6 Treffer
- post-quantum cryptography 6 Treffer
- quantum computers 6 Treffer
- client/server computing 5 Treffer
- computer network protocols 5 Treffer
- data protection 5 Treffer
- e-commerce 5 Treffer
- logarithms 5 Treffer
- logiciel 5 Treffer
- measurement 5 Treffer
- performance 5 Treffer
- world wide web 5 Treffer
- clipper (microprocessor) 4 Treffer
- cloud storage 4 Treffer
- code-based cryptography 4 Treffer
- coding theory 4 Treffer
- computer crimes 4 Treffer
- computer hacking 4 Treffer
Publikation
- communications of the acm 50 Treffer
- acm transactions on embedded computing systems 19 Treffer
- journal of the acm 10 Treffer
- acm transactions on information & system security (tissec) 9 Treffer
- acm transactions on computer systems 6 Treffer
-
18 weitere Werte:
- acm journal on emerging technologies in computing systems 4 Treffer
- acm transactions on internet technology 4 Treffer
- acm transactions on mathematical software 4 Treffer
- acm transactions on sensor networks 4 Treffer
- acm transactions on computational logic 2 Treffer
- acm transactions on computer-human interaction (tochi) 2 Treffer
- acm transactions on human-robot interaction 2 Treffer
- acm transactions on knowledge discovery from data 2 Treffer
- acm transactions on privacy & security 2 Treffer
- acm transactions on software engineering & methodology 2 Treffer
- crossroads: the international acm student magazine 2 Treffer
- operating systems review 2 Treffer
- acm sigarch computer architecture news 1 Treffer
- acm transactions on architecture and code optimization 1 Treffer
- acm transactions on intelligent systems and technology 1 Treffer
- acm transactions on storage 1 Treffer
- journal of the association for computing machinery 1 Treffer
- mit web domain 1 Treffer
Sprache
Geographischer Bezug
137 Treffer
-
In: Journal of the ACM, Jg. 71 (2024-06-01), Heft 3, S. 1-50Online academicJournalZugriff:
-
In: ACM Transactions on Embedded Computing Systems, Jg. 23 (2024-03-01), Heft 2, S. 1-29Online academicJournalZugriff:
-
In: ACM Transactions on Embedded Computing Systems, Jg. 23 (2024-03-01), Heft 2, S. 1-23Online academicJournalZugriff:
-
In: Communications of the ACM, Jg. 27 (1984-04-01), S. 388-392Online academicJournalZugriff:
-
In: Journal of the ACM, Jg. 51 (2004-03-01), Heft 2, S. 187-230Online academicJournalZugriff:
-
Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions.In: ACM Transactions on Internet Technology, Jg. 22 (2022-11-01), Heft 4, S. 1-15Online academicJournalZugriff:
-
In: ACM Transactions on Embedded Computing Systems, Jg. 13 (2014-02-01), Heft 4, S. 80-90Online academicJournalZugriff:
-
In: ACM Journal on Emerging Technologies in Computing Systems, Jg. 19 (2023), Heft 1, S. 1-20Online academicJournalZugriff:
-
Dieser Titel kann aus lizenzrechtlichen Gründen nur im Campusnetz oder nach Anmeldung angezeigt werden!academicJournalZugriff:
-
In: Communications of the ACM, Jg. 59 (2016-06-01), Heft 6, S. 70-79Online serialPeriodicalZugriff:
-
In: Journal of the ACM, Jg. 48 (2001-07-01), Heft 4, S. 702-722Online academicJournalZugriff:
-
In: ACM Transactions on Sensor Networks, Jg. 8 (2012-03-01), Heft 2, S. 13.1- (13S.)Online academicJournalZugriff:
-
In: ACM Transactions on Embedded Computing Systems, Jg. 19 (2020-06-01), Heft 3, S. 1-15Online academicJournalZugriff:
-
In: Burkhardt , J , Damgård , I , Frederiksen , T K , Orlandi , C & Ghosh , S 2023 , Improved Distributed RSA Key Generation Using the Miller-Rabin Test . in W Meng, 2023Online academicJournalZugriff:
-
Dieser Titel kann aus lizenzrechtlichen Gründen nur im Campusnetz oder nach Anmeldung angezeigt werden!Online academicJournalZugriff:
-
In: Communications of the ACM, Jg. 39 (1996-03-01), S. 55-60Online academicJournalZugriff:
-
In: Communications of the ACM, Jg. 34 (1991-11-01), S. 94-103Online academicJournalZugriff:
-
In: Communications of the ACM, Jg. 37 (1994-08-01), Heft 8, S. 9-9Online serialPeriodicalZugriff:
-
In: Operating systems review, Jg. 38 (2004), Heft 2, S. 93-96Online academicJournalZugriff:
-
In: ACM transactions on computer systems, Jg. 24 (2006), Heft 1, S. 39-69Online academicJournalZugriff: