Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- public key infrastructure 3 Treffer
- public-key cryptography 3 Treffer
- rsa 3 Treffer
- symmetric-key algorithm 3 Treffer
- criminology & law 2 Treffer
-
13 weitere Werte:
- cryptographic hash function 2 Treffer
- elliptic curve cryptography 2 Treffer
- gnu privacy guard 2 Treffer
- message authentication code 2 Treffer
- pretty good privacy 2 Treffer
- block cipher 1 Treffer
- checksum 1 Treffer
- digital signature 1 Treffer
- hash table 1 Treffer
- sensor 1 Treffer
- sensor node 1 Treffer
- transport layer security 1 Treffer
- wireless sensor network 1 Treffer
Verlag
Publikation
Sprache
5 Treffer
-
In: Dictionary of Information Science and Technology; (2013)Online E-BookZugriff:
-
In: Handbook on Securing Cyber-Physical Critical Infrastructure; (2012)Online E-BookZugriff:
-
In: Wireless Technologies: Concepts, Methodologies, Tools and Applications; (2012)Online E-BookZugriff:
-
In: Wireless Technologies: Concepts, Methodologies, Tools and Applications; (2012)Online E-BookZugriff:
-
In: Cyber Crime: Concepts, Methodologies, Tools and Applications; (2012)Online E-BookZugriff: