Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- data encryption 4 Treffer
- computer security 3 Treffer
- security 3 Treffer
- data protection 2 Treffer
- data security 2 Treffer
-
35 weitere Werte:
- data transmission systems 2 Treffer
- key management 2 Treffer
- sensor networks 2 Treffer
- belief 1 Treffer
- cellular automata 1 Treffer
- collusion attacks 1 Treffer
- combinatorial optimization 1 Treffer
- computer network management 1 Treffer
- computer network protocols 1 Treffer
- computer security software 1 Treffer
- computer simulation 1 Treffer
- computer storage devices 1 Treffer
- computer systems 1 Treffer
- cyberterrorism 1 Treffer
- data aggregation 1 Treffer
- digital communications 1 Treffer
- efficient authentication 1 Treffer
- end-to-end delay 1 Treffer
- energy efficiency 1 Treffer
- energy optimization 1 Treffer
- game theory 1 Treffer
- id-based signature 1 Treffer
- key generation 1 Treffer
- probabilistic automata 1 Treffer
- public key cryptography 1 Treffer
- pursuit-evasion games 1 Treffer
- reputation 1 Treffer
- security for resource-constrained devices 1 Treffer
- security systems industry 1 Treffer
- sybil attacks 1 Treffer
- user authentication 1 Treffer
- wireless networks 1 Treffer
- wireless sensor network 1 Treffer
- wireless sensor network security 1 Treffer
- wireless sensor networks (wsns) 1 Treffer
Verlag
Publikation
Sprache
8 Treffer
-
In: Journal of Intelligent & Fuzzy Systems, Jg. 44 (2023-03-01), Heft 3, S. 4747-4757Online academicJournalZugriff:
-
In: International Journal of Information Security, Jg. 9 (2010-08-01), Heft 4, S. 287-296Online academicJournalZugriff:
-
In: IEEE Transactions on Vehicular Technology, Jg. 58 (2009-06-01), Heft 5, S. 2482-2497Online academicJournalZugriff:
-
In: Computer Networks, Jg. 72 (2014-10-29), S. 45-61academicJournalZugriff:
-
In: IEEE Transactions on Parallel & Distributed Systems, Jg. 17 (2006-08-01), Heft 8, S. 865-882Online academicJournalZugriff:
-
In: Computer Networks, Jg. 53 (2009-12-24), Heft 18, S. 3042-3056academicJournalZugriff:
-
In: Computer Networks, Jg. 52 (2008-11-13), Heft 16, S. 3047-3061academicJournalZugriff:
-
In: Computer Communications, Jg. 31 (2008-03-05), Heft 4, S. 818-826academicJournalZugriff: