//--> //--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~subject:"Datensicherung"
~subject:"Electronic Banking"
~subject:"Theory"
~type_genre:"Book section"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"User access control"
Narrow search
Delete all filters
| 4 applied filters
Year of publication
From:
To:
Subject
All
Datensicherung
Electronic Banking
Theory
User access control
42
Zutrittskontrolle
42
Data security
26
Datensicherheit
26
Theorie
10
IT crime
8
IT-Kriminalität
8
Computer network
6
Computernetz
6
Biometrics
5
Biometrie
5
Database
3
Datenbank
3
Deutschland
3
Digitale Dienste
3
E-commerce
3
Electronic Commerce
3
Electronic banking
3
Germany
3
Großbritannien
3
Internet
3
United Kingdom
3
Web-based service
3
Algorithm
2
Algorithmus
2
Bank
2
Benutzerschnittstelle
2
Computerized method
2
Computerunterstützung
2
Information management
2
Informationsmanagement
2
Mobile Anwendung
2
Mobile Business
2
Mobile application
2
Mobile business
2
Mobile communications
2
Mobilkommunikation
2
Personalisierung
2
more ...
less ...
Online availability
All
Undetermined
1
Type of publication
All
Article
13
Type of publication (narrower categories)
All
Book section
Aufsatz im Buch
13
Article in journal
6
Aufsatz in Zeitschrift
6
Collection of articles of several authors
2
Graue Literatur
2
Hochschulschrift
2
Non-commercial literature
2
Sammelwerk
2
Thesis
2
Arbeitspapier
1
Aufsatzsammlung
1
Conference proceedings
1
Forschungsbericht
1
Konferenzschrift
1
Working Paper
1
more ...
less ...
Language
All
English
12
German
1
Author
All
Baldimtsi, F.
1
Bar-Josef, Noa
1
Božović, Vladimir
1
Böttcher, Stefan
1
Chalkias, K.
1
Chandra, Satish
1
Debbabi, Mourad
1
Ferrante, Alberto
1
Gupta, Ruchika
1
Hristu-Varsakelis, D.
1
Kiyomoto, Shinsaku
1
Koblensky, Mingyur
1
Kraus, Hans-Peter
1
Laverdière, Marc-André
1
Li, Jing
1
Loreti, Michele
1
Manganaro, Andrea
1
Me, Gianluigi
1
Mourad, Azzam
1
Obermeier, Sebastian
1
Omote, Kazumasa
1
Pirro, Daniele
1
Piuri, Vincenzo
1
Sakurai, Kouichi
1
Sampalli, Srinivas
1
Sarrecchia, Roberto
1
Shimoyama, Takeshi
1
Socek, Daniel
1
Stephanides, G.
1
Tanaka, Toshiaki
1
Tao, Kai
1
Torii, Satoru
1
Varma, Siddharth
1
Wool, Avishai
1
Ćulibrk, Dubravko
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
10
Business analytics and cyber security management in organizations
1
Mobile and ubiquitous commerce : advanced E-business methods
1
Web 2.0 und soziale Netzwerke - Risiko oder strategische Chance? : Handlungsoptionen für die Zukunftsperspektive von Kreditinstituten
1
Source
All
ECONIS (ZBW)
13
Showing
1
-
10
of
13
Sort
Relevance
Date (newest first)
Date (oldest first)
1
Customer perception and behavioral intention to use biometric-enabled e-banking services in India
Varma, Siddharth
;
Gupta, Ruchika
- In:
Business analytics and cyber security management in …
,
(pp. 137-146)
.
2017
Persistent link: https://www.econbiz.de/10011586306
Saved in:
2
Sicherheitsstrategien für das Online-Angebot von Banken
Kraus, Hans-Peter
- In:
Web 2.0 und soziale Netzwerke - Risiko oder …
,
(pp. 389-412)
.
2011
Persistent link: https://www.econbiz.de/10009389949
Saved in:
3
Strong authentication for financial services : PTDs as a compromise between security and usability
Me, Gianluigi
;
Pirro, Daniele
;
Sarrecchia, Roberto
- In:
Mobile and ubiquitous commerce : advanced E-business methods
,
(pp. 101-114)
.
2009
Persistent link: https://www.econbiz.de/10003885209
Saved in:
4
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa
;
Shimoyama, Takeshi
;
Torii, Satoru
- In:
E-business and telecommunications : 4th international …
,
(pp. 125-138)
.
2008
Persistent link: https://www.econbiz.de/10003803785
Saved in:
5
Securing biometric templates where similarity is measured with set intersection
Socek, Daniel
;
Božović, Vladimir
;
Ćulibrk, Dubravko
- In:
E-business and telecommunications : 4th international …
,
(pp. 139-151)
.
2008
Persistent link: https://www.econbiz.de/10003803793
Saved in:
6
Remote algorithmic complexity attacks against randomized hash tables
Bar-Josef, Noa
;
Wool, Avishai
- In:
E-business and telecommunications : 4th international …
,
(pp. 162-174)
.
2008
Persistent link: https://www.econbiz.de/10003803877
Saved in:
7
IPSec database query acceleration
Ferrante, Alberto
;
Chandra, Satish
;
Piuri, Vincenzo
- In:
E-business and telecommunications : 4th international …
,
(pp. 188-200)
.
2008
Persistent link: https://www.econbiz.de/10003803886
Saved in:
8
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai
;
Li, Jing
;
Sampalli, Srinivas
- In:
E-business and telecommunications : 4th international …
,
(pp. 201-213)
.
2008
Persistent link: https://www.econbiz.de/10003803905
Saved in:
9
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
10
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
1
2
Next
Last
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->