//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
subject:"Biometrics"
~isPartOf:"E-business and telecommunications : 4th international conference ; revised selected papers"
~subject:"Computer network"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Berechtigungskontrolle"
Narrow search
Delete all filters
| 3 applied filters
Year of publication
From:
To:
Subject
All
Biometrics
Computer network
Data security
10
Datensicherheit
10
Theorie
10
Theory
10
User access control
10
Zutrittskontrolle
10
IT crime
5
IT-Kriminalität
5
Computernetz
3
Algorithm
2
Algorithmus
2
Database
2
Datenbank
2
Mobile Anwendung
2
Mobile application
2
Betriebliches Informationssystem
1
Betrug
1
Biometrie
1
Business intelligence system
1
Computerized method
1
Computerunterstützung
1
E-commerce
1
Electronic Commerce
1
Electronic data interchange
1
Elektronischer Datenaustausch
1
Enterprise architecture
1
Fraud
1
Inter-firm cooperation
1
Internet
1
Knowledge transfer
1
Local Area Network
1
Local area network
1
Open Source
1
Open source
1
Simulation
1
Unternehmensarchitektur
1
Unternehmenskooperation
1
Wissenstransfer
1
more ...
less ...
Type of publication
All
Article
4
Type of publication (narrower categories)
All
Aufsatz im Buch
4
Book section
4
Language
All
English
4
Author
All
Baldimtsi, F.
1
Božović, Vladimir
1
Chalkias, K.
1
Debbabi, Mourad
1
Hristu-Varsakelis, D.
1
Koblensky, Mingyur
1
Laverdière, Marc-André
1
Loreti, Michele
1
Manganaro, Andrea
1
Mourad, Azzam
1
Socek, Daniel
1
Stephanides, G.
1
Ćulibrk, Dubravko
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
Banking and information technology : BIT ; a strategic report for top management
1
Business analytics and cyber security management in organizations
1
Communications in computer and information science
1
E-technologies: innovation in an open world : 4th international conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009 ; proceedings
1
E-technologies: transformation in a connected world : 5th international conference, MCETECH 2011, Les Diablerets, Switzerland, January 23 - 26, 2011 ; revised selected papers
1
Emerging methods in predictive analytics : risk management and decision-making
1
International journal of e-business research : an official publication of the Information Resources Management Association
1
International journal of electronic customer relationship management : IJECRM
1
Internetworked world : 15th Workshop on e-Business, WeB 2016, Dublin, Ireland, December 10, 2016 : revised selected papers
1
Journal of advertising research
1
Journal of organizational computing and electronic commerce
1
Journal of payments strategy & systems
1
Knowledge enterprise: intelligent strategies in product design, manufacturing, and management : proceedings of PROLAMAT 2006, IFIP TC5 international conference, June 15-17 2006, Shanghai, China
1
Professionelles Sales & Service Management : Vorsprung durch konsequente Kundenorientierung
1
Technology analysis & strategic management
1
more ...
less ...
Source
All
ECONIS (ZBW)
4
Showing
1
-
4
of
4
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
Securing biometric templates where similarity is measured with set intersection
Socek, Daniel
;
Božović, Vladimir
;
Ćulibrk, Dubravko
- In:
E-business and telecommunications : 4th international …
,
(pp. 139-151)
.
2008
Persistent link: https://www.econbiz.de/10003803793
Saved in:
2
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
3
A security hardening language based on aspect-orientation
Mourad, Azzam
;
Laverdière, Marc-André
;
Debbabi, Mourad
- In:
E-business and telecommunications : 4th international …
,
(pp. 254-266)
.
2008
Persistent link: https://www.econbiz.de/10003803946
Saved in:
4
Design of a password-based EAP method
Manganaro, Andrea
;
Koblensky, Mingyur
;
Loreti, Michele
- In:
E-business and telecommunications : 4th international …
,
(pp. 343-355)
.
2008
Persistent link: https://www.econbiz.de/10003804268
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->