//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
subject:"Algorithm"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Berechtigungskontrolle"
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
Algorithm
User access control
109
Zutrittskontrolle
109
Data security
54
Datensicherheit
54
IT crime
22
IT-Kriminalität
22
Theorie
16
Theory
16
Biometrics
15
Biometrie
15
Data protection
12
Datenschutz
12
USA
9
United States
9
Computer network
8
Computernetz
8
E-commerce
8
Electronic Commerce
8
Deutschland
7
Electronic Banking
7
Electronic banking
7
Germany
7
Internet
7
Information management
6
Informationsmanagement
6
Authentifikation
5
Betriebliches Informationssystem
5
Social costs
5
Soziale Kosten
5
Business intelligence system
4
Database
4
Datenbank
4
Digitale Dienste
4
Economics of crime
4
Innovation adoption
4
Innovationsakzeptanz
4
Kriminalitätsökonomik
4
Web-based service
4
Airport
3
Alcohol consumption
3
more ...
less ...
Type of publication
All
Article
3
Type of publication (narrower categories)
All
Aufsatz im Buch
2
Book section
2
Article in journal
1
Aufsatz in Zeitschrift
1
Language
All
English
3
Author
All
Bar-Josef, Noa
1
Kalpana, P.
1
Kiyomoto, Shinsaku
1
Sakurai, Kouichi
1
Saravanan, P.
1
Tanaka, Toshiaki
1
Wool, Avishai
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
2
International journal of enterprise network management
1
Source
All
ECONIS (ZBW)
3
Showing
1
-
3
of
3
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
A novel approach to design A5/1 stream cipher using power analysis attack resistant reversible logic gates
Saravanan, P.
;
Kalpana, P.
- In:
International journal of enterprise network management
7
(
2016
)
1
,
pp. 70-85
Persistent link: https://www.econbiz.de/10011592516
Saved in:
2
Remote algorithmic complexity attacks against randomized hash tables
Bar-Josef, Noa
;
Wool, Avishai
- In:
E-business and telecommunications : 4th international …
,
(pp. 162-174)
.
2008
Persistent link: https://www.econbiz.de/10003803877
Saved in:
3
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->