//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~person:"Baldimtsi, F."
~person:"Cai, Hongxia"
~subject:"Zutrittskontrolle"
~type_genre:"Aufsatz im Buch"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Berechtigungskontrolle"
Narrow search
Delete all filters
| 4 applied filters
Year of publication
From:
To:
Subject
All
Zutrittskontrolle
Computer network
2
Computernetz
2
User access control
2
Data security
1
Datensicherheit
1
IT crime
1
IT-Kriminalität
1
Industrie
1
Manufacturing industries
1
Theorie
1
Theory
1
more ...
less ...
Type of publication
All
Article
2
Type of publication (narrower categories)
All
Aufsatz im Buch
Book section
2
Language
All
English
2
Author
All
Baldimtsi, F.
Cai, Hongxia
Stepien, Bernard
2
Adi, Kamel
1
Arshad, Junaid
1
Bar-Josef, Noa
1
Barz, Christiane
1
Baumgärtner, Frank
1
Bayliss, Christopher
1
Bistarelli, Stefano
1
Bouzida, Yacine
1
Božović, Vladimir
1
Böttcher, Stefan
1
Carullo, Giuliana
1
Chalkias, K.
1
Chandra, Satish
1
Colantonio, Alessandro
1
Debbabi, Mourad
1
Deters, Ralph
1
Dyachuk, Dmytro
1
Ege, Raimund K.
1
Fang, Minglun
1
Felty, Amy
1
Ferrante, Alberto
1
Ferrucci, Filomena
1
Fürst, Franz Thomas
1
Gilbert-Rolfe, Cyrus
1
Gupta, Ruchika
1
Halang, Wolfgang A.
1
Hardy, Keith
1
Hattak, Ikhlass
1
Hristu-Varsakelis, D.
1
JayaMangalam, Vasugi
1
Jie, Wei
1
Johnson, M.Eric
1
Jorga, Frank Stefan
1
Kang, Yin
1
Kedjar, Saadia
1
Kiyomoto, Shinsaku
1
Koblensky, Mingyur
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
1
Knowledge enterprise: intelligent strategies in product design, manufacturing, and management : proceedings of PROLAMAT 2006, IFIP TC5 international conference, June 15-17 2006, Shanghai, China
1
Source
All
ECONIS (ZBW)
2
Showing
1
-
2
of
2
Sort
Relevance
Date (newest first)
Date (oldest first)
1
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
2
Access control model of Manufacturing Grid
Cai, Hongxia
;
Yu, Ta
;
Fang, Minglun
- In:
Knowledge enterprise: intelligent strategies in product …
,
(pp. 938-943)
.
2006
Persistent link: https://www.econbiz.de/10003408477
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->