Suchergebnisse
Katalog
Aufsätze & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- block cipher 3 Treffer
- hash function 3 Treffer
- provable security 3 Treffer
- aes 2 Treffer
- blockcipher 2 Treffer
-
16 weitere Werte:
- body sensor network 2 Treffer
- pseudorandom function 2 Treffer
- related-key attack 2 Treffer
- rfid 2 Treffer
- advance encryption standard 1 Treffer
- body sensor networks 1 Treffer
- computer access control 1 Treffer
- data security 1 Treffer
- information retrieval 1 Treffer
- linear cryptanalysis 1 Treffer
- medical informatics 1 Treffer
- random oracle 1 Treffer
- random oracle model 1 Treffer
- random permutation 1 Treffer
- wireless sensor network 1 Treffer
- wireless sensor networks 1 Treffer
Verlag
Publikation
- advances in cryptology - crypto 2000 : 20th annual international cryptology conference santa barbara, california, usa, august 20-24, 2000 proceedings 1 Treffer
- computer security - esorics 2013 : 18th european symposium on research in computer security, egham, uk, september 9-13, 2013. proceedings 1 Treffer
- information security & privacy (9783540699712) 1 Treffer
- information security and privacy - 13th australasian conference, acisp 2008, proceedings 1 Treffer
- information security and privacy : 13th australasian conference, acisp 2008, wollongong, australia, july 7-9, 2008. proceedings 1 Treffer
-
6 weitere Werte:
- information security applications (9783540710929) 1 Treffer
- information security applications : 7th international workshop, wisa 2006, jeju island, korea, august 28-30, 2006, revised selected papers 1 Treffer
- journal of computer science & technology (10009000) 1 Treffer
- journal of computer science and technology 1 Treffer
- lecture notes in computer science 1 Treffer
- progress in cryptology - indocrypt 2009 : 10th international conference on cryptology in india, new delhi, india, december 13-16, 2009. proceedings 1 Treffer
Sprache
Inhaltsanbieter
6 Treffer
-
2008Online E-BookZugriff:
-
In: Journal of Computer Science & Technology (10009000), Jg. 29 (2014), Heft 1, S. 53-68Online academicJournalZugriff:
-
2009Online E-BookZugriff:
-
In: Information Security Applications (9783540710929); (2007) S. 173-186BuchZugriff:
-
2000Online E-BookZugriff: