Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- cifrado rsa 31 Treffer
- cryptage rsa 31 Treffer
- rsa ciphering 31 Treffer
- computer systems and distributed systems. user interface 30 Treffer
- systemes informatiques et systemes repartis. interface utilisateur 30 Treffer
-
45 weitere Werte:
- cryptographie 25 Treffer
- cryptography 25 Treffer
- gestion des memoires et des fichiers (y compris la protection et la securite des fichiers) 21 Treffer
- memory and file management (including protection and security) 21 Treffer
- memory organisation. data processing 21 Treffer
- organisation des memoires. traitement des donnees 21 Treffer
- criptografia 20 Treffer
- cle publique 19 Treffer
- llave publica 19 Treffer
- public key 19 Treffer
- computer security 18 Treffer
- information, signal and communications theory 18 Treffer
- securite informatique 18 Treffer
- seguridad informatica 18 Treffer
- signal and communications theory 18 Treffer
- telecommunications and information theory 18 Treffer
- telecommunications et theorie de l'information 18 Treffer
- theorie de l'information, du signal et des communications 18 Treffer
- theorie du signal et des communications 18 Treffer
- telecommunications 15 Treffer
- safety 13 Treffer
- securite 13 Treffer
- seguridad 13 Treffer
- digital signature 11 Treffer
- red sin hilo 11 Treffer
- reseau sans fil 11 Treffer
- wireless network 11 Treffer
- approche probabiliste 10 Treffer
- enfoque probabilista 10 Treffer
- firma numerica 10 Treffer
- probabilistic approach 10 Treffer
- signature electronique 10 Treffer
- protocole transmission 9 Treffer
- protocolo transmision 9 Treffer
- transmission protocol 9 Treffer
- cryptographie cle publique 8 Treffer
- public key cryptography 8 Treffer
- autenticacion 7 Treffer
- authentication 7 Treffer
- authentification 7 Treffer
- informatique mobile 7 Treffer
- mobile computing 7 Treffer
- modeling 7 Treffer
- modelisation 7 Treffer
- modelizacion 7 Treffer
Verlag
Publikation
- lecture notes in computer science 21 Treffer
- advances in cryptology - eurocrypt 2004 (interlaken, 2-6 may 2004) 5 Treffer
- 0icics 2005 4 Treffer
- acns 2005 : applied cryptography and network security (new york ny, 7-10 june 2005) 4 Treffer
- information and communications security (7th international conference, icics 2005, beijing, china, december 10-13, 2005) 4 Treffer
-
30 weitere Werte:
- information security (palo alto ca, 27-29 september 2004) 3 Treffer
- international journal of sensor networks (print) 2 Treffer
- 0cisc 2005 1 Treffer
- 0esas 2005 1 Treffer
- 0hipc 2005 1 Treffer
- 0ispa 2005 1 Treffer
- 23rd ieee international symposium on reliable distributed systems (18-20 october, 2004, florianpolis) 1 Treffer
- acm transactions on computer systems 1 Treffer
- algorithms 1 Treffer
- asiacrypt '98 : advances in cryptology (beijing, 18-22 october 1998) 1 Treffer
- computer security (sophia antipolis, 13-15 september 2004) 1 Treffer
- computers communications (proceedings) 1 Treffer
- energy-efficient algorithm and protocol design in sensor networks 1 Treffer
- high performance computing (hipc 2005) 1 Treffer
- hsnmc 2004 : high speed networks and multimedia communications (toulouse, 30 july - 2 july 2004) 1 Treffer
- ieee transactions on computers 1 Treffer
- ieee transactions on intelligent transportation systems 1 Treffer
- information networking : networking technologies for broadband and mobile networks (busan, 18-20 february 2004, revised selected papers) 1 Treffer
- information security and cryptology (cisc 2005) 1 Treffer
- infrasec 2002 : infrastructure security (bristol, 1-3 october 2002) 1 Treffer
- international journal of network security (print) 1 Treffer
- journal of information science and engineering 1 Treffer
- mata 2004 : mobility aware technologies and applications (florianopolis, 20-22 october 2004) 1 Treffer
- networking 2005 (networking technologies, services, and protocols ; performance of computer and communication networks ; mobile and wireless communication systems) 1 Treffer
- networking and mobile computing (zhangjiajie, 2-4 august 2005) 1 Treffer
- parallel and distributed processing and applications (ispa 2005 workshops) 1 Treffer
- security and privacy in ad-hoc and sensor networks (second european workshop, esas 2005, visegrad, hungary, july 13-14, 2005) 1 Treffer
- spc 2005 : security in pervasive computing (boppard, 6-8 april 2005) 1 Treffer
- theoretical computer science 1 Treffer
- wireless personal communications 1 Treffer
Sprache
40 Treffer
-
In: Networking and mobile computing (Zhangjiajie, 2-4 August 2005), 2005, S. 1094-1104KonferenzZugriff:
-
In: ACNS 2005 : applied cryptography and network security (New York NY, 7-10 June 2005), 2005, S. 269-284KonferenzZugriff:
-
In: ACNS 2005 : applied cryptography and network security (New York NY, 7-10 June 2005), 2005, S. 56-74KonferenzZugriff:
-
In: Information security (Palo Alto CA, 27-29 September 2004), 2004, S. 52-60KonferenzZugriff:
-
In: Information security (Palo Alto CA, 27-29 September 2004), 2004, S. 73-86KonferenzZugriff:
-
In: International journal of network security (Print), Jg. 15 (2013), Heft 4, S. 307-312academicJournalZugriff:
-
In: Information security (Palo Alto CA, 27-29 September 2004), 2004, S. 13-24KonferenzZugriff:
-
In: IEEE transactions on computers, Jg. 43 (1994), Heft 2, S. 163-174Online academicJournalZugriff:
-
In: ASIACRYPT '98 : advances in cryptology (Beijing, 18-22 October 1998), 1998, S. 372-379KonferenzZugriff:
-
In: Information and communications security (7th international conference, ICICS 2005, Beijing, China, December 10-13, 2005), 2005, S. 207-219KonferenzZugriff:
-
In: ACNS 2005 : applied cryptography and network security (New York NY, 7-10 June 2005), 2005, S. 513-528KonferenzZugriff:
-
In: Networking 2005 (networking technologies, services, and protocols ; performance of computer and communication networks ; mobile and wireless communication systems), 2005, S. 102-113KonferenzZugriff:
-
In: Advances in cryptology - EUROCRYPT 2004 (Interlaken, 2-6 May 2004), 2004, S. 56-73KonferenzZugriff:
-
In: 23rd IEEE International Symposium on reliable distributed systems (18-20 October, 2004, Florianpolis), 2004, S. 195-204KonferenzZugriff:
-
In: HSNMC 2004 : high speed networks and multimedia communications (Toulouse, 30 July - 2 July 2004), 2004, S. 696-706KonferenzZugriff:
-
In: Wireless personal communications, Jg. 77 (2014), Heft 1, S. 411-432Online academicJournalZugriff:
-
In: Security and privacy in ad-hoc and sensor networks (Second European workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005), 2005, S. 91-101KonferenzZugriff:
-
In: Information and communications security (7th international conference, ICICS 2005, Beijing, China, December 10-13, 2005), 2005, S. 269-279KonferenzZugriff:
-
In: SPC 2005 : security in pervasive computing (Boppard, 6-8 April 2005), 2005, S. 86-100KonferenzZugriff:
-
In: ACNS 2005 : applied cryptography and network security (New York NY, 7-10 June 2005), 2005, S. 138-150KonferenzZugriff: