//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
subject:"Algorithm"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"User access control"
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
Algorithm
User access control
109
Zutrittskontrolle
109
Data security
57
Datensicherheit
57
IT crime
22
IT-Kriminalität
22
Theorie
18
Theory
18
Zugriffskontrolle
17
Biometrics
15
Biometrie
15
Datenschutz
13
Data protection
12
Betriebliches Informationssystem
10
USA
9
United States
9
Computer network
8
Computernetz
8
E-commerce
8
Electronic Commerce
8
Deutschland
7
Electronic Banking
7
Electronic banking
7
Germany
7
Identitätsverwaltung
7
Information management
7
Informationsmanagement
7
Internet
7
Datensicherung
6
Authentifikation
5
Business intelligence system
5
Computersicherheit
5
Social costs
5
Soziale Kosten
5
Airport
4
Database
4
Datenbank
4
Digitale Dienste
4
Economics of crime
4
Flughafen
4
more ...
less ...
Type of publication
All
Article
3
Type of publication (narrower categories)
All
Aufsatz im Buch
2
Book section
2
Article in journal
1
Aufsatz in Zeitschrift
1
Language
All
English
3
Author
All
Bar-Josef, Noa
1
Kalpana, P.
1
Kiyomoto, Shinsaku
1
Sakurai, Kouichi
1
Saravanan, P.
1
Tanaka, Toshiaki
1
Wool, Avishai
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
2
International journal of enterprise network management
1
Source
All
ECONIS (ZBW)
3
Showing
1
-
3
of
3
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
A novel approach to design A5/1 stream cipher using power analysis attack resistant reversible logic gates
Saravanan, P.
;
Kalpana, P.
- In:
International journal of enterprise network management
7
(
2016
)
1
,
pp. 70-85
Persistent link: https://www.econbiz.de/10011592516
Saved in:
2
Remote algorithmic complexity attacks against randomized hash tables
Bar-Josef, Noa
;
Wool, Avishai
- In:
E-business and telecommunications : 4th international …
,
(pp. 162-174)
.
2008
Persistent link: https://www.econbiz.de/10003803877
Saved in:
3
K2 stream cipher
Kiyomoto, Shinsaku
;
Tanaka, Toshiaki
;
Sakurai, Kouichi
- In:
E-business and telecommunications : 4th international …
,
(pp. 214-226)
.
2008
Persistent link: https://www.econbiz.de/10003803906
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->