//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~subject:"IT crime"
~person:"Sakurai, Kouichi"
~person:"Li, Jing"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject:"Access Control"
Narrow search
Delete all filters
| 3 applied filters
Year of publication
From:
To:
Subject
All
IT crime
Data security
2
Datensicherheit
2
IT-Kriminalität
2
Theorie
2
Theory
2
User access control
2
Zutrittskontrolle
2
Algorithm
1
Algorithmus
1
Local Area Network
1
Local area network
1
Mobile Anwendung
1
Mobile application
1
more ...
less ...
Type of publication
All
Article
2
Type of publication (narrower categories)
All
Aufsatz im Buch
2
Book section
2
Language
All
English
2
Author
All
Sakurai, Kouichi
Li, Jing
Roberds, William
3
Schreft, Stacey L.
2
Baldimtsi, F.
1
Chalkias, K.
1
Chatterjee, Chirantan
1
Clark, Cynthia E.
1
Coetzee, Marius
1
Cremonini, Marco
1
Culnan, Mary J.
1
Debbabi, Mourad
1
Engel, Kathryn
1
Filipe, Joaquim
1
Gideon, Carolyn
1
Harvey, James W.
1
Hogendorn, Christiaan
1
Hristu-Varsakelis, D.
1
Kalpana, P.
1
Keitel, Philip Lehman
1
Kiyomoto, Shinsaku
1
Kraus, Hans-Peter
1
Laverdière, Marc-André
1
McCrohan, Kevin F.
1
Mikhed, Vyacheslav
1
Mourad, Azzam
1
Nizovtsev, Dmitri
1
Omote, Kazumasa
1
Opderbeck, David W.
1
Peyton, Liam
1
Sampalli, Srinivas
1
Saravanan, P.
1
Schreft, Stacey
1
Shimoyama, Takeshi
1
Sokol, D. Daniel
1
Stephanides, G.
1
Stepien, Bernard
1
Tanaka, Toshiaki
1
Tao, Kai
1
Torii, Satoru
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
2
Source
All
ECONIS (ZBW)
2
Showing
1
-
2
of
2
Sort
Relevance
Date (newest first)
Date (oldest first)
1
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai
;
Li, Jing
;
Sampalli, Srinivas
- In:
E-business and telecommunications : 4th international …
,
(pp. 201-213)
.
2008
Persistent link: https://www.econbiz.de/10003803905
Saved in:
2
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->