Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- lpn 11 Treffer
- authentication protocols 7 Treffer
- cryptography 6 Treffer
- hb 6 Treffer
- algebraic cryptanalysis 5 Treffer
-
45 weitere Werte:
- covering codes 5 Treffer
- applied mathematics 4 Treffer
- business 4 Treffer
- business.industry 4 Treffer
- computer science 4 Treffer
- computer science applications 4 Treffer
- data encryption 4 Treffer
- eavesdropping 4 Treffer
- message authentication 4 Treffer
- multivariate cryptography 4 Treffer
- rfid 4 Treffer
- software 4 Treffer
- 02 engineering and technology 3 Treffer
- 0202 electrical engineering, electronic engineering, information engineering 3 Treffer
- bkw 3 Treffer
- computational complexity 3 Treffer
- computer security 3 Treffer
- lapin 3 Treffer
- large-scale 3 Treffer
- learning 3 Treffer
- multi-party computation 3 Treffer
- syndrome decoding 3 Treffer
- 01 natural sciences 2 Treffer
- 0102 computer and information sciences 2 Treffer
- 010201 computation theory & mathematics 2 Treffer
- 020201 artificial intelligence & image processing 2 Treffer
- 020206 networking & telecommunications 2 Treffer
- algorithm 2 Treffer
- authentication 2 Treffer
- authentication (law) 2 Treffer
- authentication protocol 2 Treffer
- binary code 2 Treffer
- chosen ciphertext security 2 Treffer
- ciphers 2 Treffer
- computer 2 Treffer
- computer network 2 Treffer
- computer security software 2 Treffer
- digital electronics 2 Treffer
- discrete mathematics 2 Treffer
- electronic surveillance 2 Treffer
- encryption 2 Treffer
- equations 2 Treffer
- heuristic algorithms 2 Treffer
- keystroke timing authentication 2 Treffer
- laptop 2 Treffer
Verlag
Sprache
13 Treffer
-
In: Journal of Cryptology, Jg. 33 (2020), Heft 1, S. 1-33Online academicJournalZugriff:
-
In: Journal of cryptology, Jg. 33 (2019), Heft 1, S. 1-33Online serialPeriodicalZugriff:
-
In: Journal of Cryptology, Jg. 31 (2018-07-01), Heft 3, S. 845-884Online academicJournalZugriff:
-
In: Journal of Cryptology, Jg. 35 (2022-04-01), Heft 2, S. 1-69Online academicJournalZugriff:
-
In: Journal of Cryptology, Jg. 35 (2022-04-01), Heft 2, S. 1-66Online academicJournalZugriff:
-
In: Journal of Cryptology, Jg. 30 (2017-10-01), Heft 4, S. 1238-1275Online academicJournalZugriff:
-
In: Journal of Cryptology, Jg. 29 (2016-07-01), Heft 3, S. 552-576Online academicJournalZugriff:
-
In: Journal of Cryptology, Jg. 23 (2010-07-01), Heft 3, S. 402-421Online academicJournalZugriff:
-
In: Journal of Cryptology, Jg. 23 (2010-07-01), Heft 3, S. 402-421Online academicJournalZugriff:
-
In: Journal of Cryptology, Jg. 29 (2015-03-20), S. 552-576Online unknownZugriff:
-
In: Journal of Cryptology, 2017Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 31 (2017-11-28), S. 845-884Online unknownZugriff:
-
In: Journal of Cryptology, Jg. 23 (2010-02-17), S. 402-421Online unknownZugriff: