Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- security 5 Treffer
- anonymity 3 Treffer
- smart card 3 Treffer
- anonymous 1 Treffer
- dynamic id 1 Treffer
-
25 weitere Werte:
- ecc 1 Treffer
- fog computing 1 Treffer
- forgery attack 1 Treffer
- hacker 1 Treffer
- key agreement 1 Treffer
- key establishment 1 Treffer
- key exchange 1 Treffer
- man-in-the-middle attack 1 Treffer
- multi-server 1 Treffer
- one-time password 1 Treffer
- password 1 Treffer
- phishing 1 Treffer
- portable storage device 1 Treffer
- roaming service 1 Treffer
- s/key 1 Treffer
- scada system 1 Treffer
- secure communication 1 Treffer
- sensor networks 1 Treffer
- session key 1 Treffer
- wireless network 1 Treffer
- wireless security 1 Treffer
- 보안 1 Treffer
- 센서 네트워크 1 Treffer
- 인증 1 Treffer
- 포그 컴퓨팅 1 Treffer
Verlag
Publikation
11 Treffer
-
In: International Journal of Security and Its Applications, Jg. 8 (2014-03-30), Heft 2, S. 1-8academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 143-152academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 9 (2015-09-30), Heft 9, S. 265-274academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 10 (2016-11-30), Heft 11, S. 79-88academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-07-30), Heft 3, S. 45-54academicJournalZugriff:
-
In: 한국융합학회논문지, Jg. 9 (2018-05-31), Heft 5, S. 27-32academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-11-30), Heft 6, S. 335-344academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-05-30), Heft 3, S. 271-282academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 7 (2013-01-30), Heft 1, S. 95-104academicJournalZugriff:
-
In: International Journal of Security and Its Applications, Jg. 6 (2012-04-30), Heft 2, S. 203-210academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 2 (2005-11-28), Heft 2, S. 136-140academicJournalZugriff: