//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
type_genre:"Konferenzschrift/Kongressbericht"
~person:"Chalkias, K."
~subject:"Datensicherheit"
~type_genre:"Arbeitspapier"
~type_genre:"Book section"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Computernetz"
Narrow search
Delete all filters
| 5 applied filters
Year of publication
From:
To:
Subject
All
Datensicherheit
Computer network
1
Computernetz
1
Data security
1
IT crime
1
IT-Kriminalität
1
Theorie
1
Theory
1
User access control
1
Zutrittskontrolle
1
more ...
less ...
Type of publication
All
Article
1
Type of publication (narrower categories)
All
Konferenzschrift/Kongressbericht
Arbeitspapier
Book section
Aufsatz im Buch
1
Language
All
English
1
Author
All
Chalkias, K.
Kovenock, Daniel J.
2
Roberson, Brian
2
Ahmad, Vasim
1
Ahsant, Mehran
1
Allende, Marcos
1
Alok Singh
1
Arshad, Junaid
1
Baldimtsi, F.
1
Bayliss, Christopher
1
Boele, Thomas
1
Camp, L. Jean
1
Cerón, Sergio
1
Chowdhury, Dipanwita Roy
1
Da Silva, Marcelo
1
Debbabi, Mourad
1
Flauzac, Olivier
1
Garg, Poonam
1
Geiger, Martin Josef
1
Gilmore, Jonathan
1
Goyal, Lalit
1
Hristu-Varsakelis, D.
1
Huang, Yo-ping
1
Jie, Wei
1
Jones, Duncan
1
Kelley, Timothy
1
Kitchener, Nick
1
Koblensky, Mingyur
1
Koke, Hartmut
1
Kumar, Jugandar
1
Laverdière, Marc-André
1
Leal, Antonio
1
Lee, Adam J.
1
Loreti, Michele
1
López, Diego
1
Madelin, John
1
Manganaro, Andrea
1
Merriman, Ben
1
Mourad, Azzam
1
Nolot, Florent
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
1
Source
All
ECONIS (ZBW)
1
Showing
1
-
1
of
1
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->