//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~person:"Baldimtsi, F."
~person:"Birch, David G. W."
~source:"econis"
~subject:"Biometrie"
~subject:"Zutrittskontrolle"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"User access control"
Narrow search
Delete all filters
| 5 applied filters
Year of publication
From:
To:
Subject
All
Biometrie
Zutrittskontrolle
Computer network
2
Computernetz
2
Data security
2
Datensicherheit
2
User access control
2
Authentifikation
1
Biometrics
1
Chipkarte
1
IT crime
1
IT-Kriminalität
1
RFID
1
Smart card
1
Theorie
1
Theory
1
more ...
less ...
Type of publication
All
Article
1
Book / Working Paper
1
Type of publication (narrower categories)
All
Aufsatz im Buch
1
Aufsatzsammlung
1
Book section
1
Collection of articles of several authors
1
Sammelwerk
1
Language
All
English
2
Author
All
Baldimtsi, F.
Birch, David G. W.
Bellou, Andriana
3
Roberds, William
3
Bhatt, Rachana
2
Eckert, Claudia
2
Li, Yan
2
Schreft, Stacey L.
2
Sowa, Aleksandra
2
Stepien, Bernard
2
Sun, Lili
2
Wang, Hua
2
Abdullah, Matin Saad
1
Adi, Kamel
1
Adl, Rosa Karimi
1
Agarwal, Ratish
1
Ahmed, Waseem
1
Akar, Gulsah
1
Al-Harby, Fahad
1
Ansari, Zahid A.
1
Antonakopoulou, Anna
1
Arshad, Junaid
1
Bansal, Nitin
1
Bar-Josef, Noa
1
Barker, Ken
1
Bartmann, Dieter
1
Barz, Christiane
1
Baumgärtner, Frank
1
Bayliss, Christopher
1
Bertino, Elisa
1
Bhatt, Rachana R.
1
Bistarelli, Stefano
1
Bouzida, Yacine
1
Božović, Vladimir
1
Broxis, John
1
Burnett, Royce D.
1
Böttcher, Stefan
1
Büllingen, Franz
1
Cai, Hongxia
1
Caliendo, Marco
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
1
Source
All
ECONIS (ZBW)
Showing
1
-
2
of
2
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
2
Digital identity management : perspectives on the technological, business and social implications
Birch, David G. W.
(
ed.
)
-
2007
Persistent link: https://www.econbiz.de/10003355602
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->