Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- data encryption 25 Treffer
- computer security 24 Treffer
- public key cryptography 14 Treffer
- rsa data security inc. 12 Treffer
- computer algorithms 11 Treffer
-
45 weitere Werte:
- cryptography 11 Treffer
- digital signatures 10 Treffer
- computer software industry 8 Treffer
- algorithms 7 Treffer
- authentication (law) 7 Treffer
- computer network security 7 Treffer
- security systems 7 Treffer
- clipper (microprocessor) 4 Treffer
- computer crimes 4 Treffer
- computer hacking 4 Treffer
- computer passwords 4 Treffer
- computer security software 4 Treffer
- computer security vulnerabilities 4 Treffer
- computer software 4 Treffer
- digital electronics 4 Treffer
- government agencies 4 Treffer
- law enforcement 4 Treffer
- letters to the editor 4 Treffer
- license agreements 4 Treffer
- microsoft corp. 4 Treffer
- national institute of standards & technology (u.s.) 4 Treffer
- patent infringement 4 Treffer
- right of privacy 4 Treffer
- rsa algorithm 4 Treffer
- standards 4 Treffer
- telecommunication systems 4 Treffer
- united states. national security agency/central security service 4 Treffer
- access control of computer networks 3 Treffer
- cloud computing 3 Treffer
- computer network architectures 3 Treffer
- data security 3 Treffer
- data warehousing 3 Treffer
- gateways (computer networks) 3 Treffer
- hashing 3 Treffer
- miniature electronic equipment 3 Treffer
- national security 3 Treffer
- software as a service 3 Treffer
- cyberculture 2 Treffer
- cyberspace 2 Treffer
- internet searching 2 Treffer
- intuition 2 Treffer
- online social networks 2 Treffer
- virtual reality 2 Treffer
- cloud storage 1 Treffer
- computer network monitoring 1 Treffer
Publikation
Sprache
15 Treffer
-
In: Communications of the ACM, Jg. 59 (2016-06-01), Heft 6, S. 70-79Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 27 (1984-04-01), Heft 4, S. 388-392Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 37 (1994-08-01), Heft 8, S. 9-9Online serialPeriodicalZugriff:
-
In: ACM SIGARCH Computer Architecture News, Jg. 30 (2002-03-01), Heft 1, S. 5-11Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 35 (1992-11-01), Heft 11, S. 19-23Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 37 (1994-09-01), Heft 9, S. 109-117Online serialPeriodicalZugriff:
-
In: Crossroads: The International ACM Student Magazine, Jg. 11 (2005-05-01), Heft 3, S. 5-5Online serialPeriodicalZugriff:
-
In: Crossroads: The International ACM Student Magazine, Jg. 11 (2005-05-01), Heft 3, S. 4-4Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 49 (2006-09-01), Heft 9, S. 50-54Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 34 (1991-08-01), Heft 8, S. 9-9Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 40 (1997-07-01), Heft 7, S. 9-9Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 37 (1994-05-01), Heft 5, S. 146-146Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 37 (1994-03-01), Heft 3, S. 9-9Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 56 (2013-02-01), Heft 2, S. 64-73Online serialPeriodicalZugriff:
-
In: Communications of the ACM, Jg. 53 (2010-03-01), Heft 3, S. 120-121Online serialPeriodicalZugriff: