Kategorien
Handverlesen
Alice Munro
Paul Auster
Über Mütter
Archiv
Viel besprochen
Bücherschau des Tages
Literaturbeilagen
Bücherbrief
Bücher der Saison
Bestenlisten
Ausgezeichnet
Selbst gelesen
von Marie-Luise Knott
von Thekla Dannenberg
von Peter Truschner
von Angela Schader
Wer wir sind
Datenschutz
Impressum
Gutschein
Kostenloser Newsletter
Der
Perlentaucher unter den Buchläden
Eichendorff21
Warenkorb
Einloggen oder registrieren
Genauer suchen (17 Treffer)
Filter schließen (17 Treffer)
Stichwort auswählen
Alle Stichworte
Securecommunication (17)
Datasecurity (8)
Authentication (5)
Digitalsignatures (4)
Informationsecurity (4)
Security (4)
Privacy (3)
Signatur (3)
5gsecurity (2)
Accesscontrol (2)
Anonymity (2)
Authenticationprotocol (2)
Chaoscontrol (2)
Complexity (2)
Cryptanalysis (2)
Cryptographicprotocols (2)
Cryptography (2)
Cryptology (2)
Dataencryption (2)
Digitalpaymentsystems (2)
Digitalwatermarking (2)
Electroniccommerce (2)
Information (2)
Internetofthings (2)
Networksecurity (2)
Privacypreservation (2)
Systemssecurity (2)
Tools (2)
Booleanfunction (1)
Brightsoliton (1)
Code (1)
Communication (1)
Covertcommunication (1)
Cryptoanalysis (1)
Cryptographicalgorithms (1)
Cryptographichardware (1)
Darksoliton (1)
Datadigitalcash (1)
Dataprotection (1)
Dataretention (1)
Digitalpaymentsystem (1)
Digitalsignatureschemes (1)
Digitalsignaturesystems (1)
E-Commerce (1)
Electroniccash (1)
Electronicmarketplaces (1)
Electronicpaymentsystems (1)
Ellipticcurve (1)
Embeddedsystems (1)
Encryption (1)
Error-Correctingcode (1)
Financialtransactions (1)
Finitefield (1)
Fpga-Basedattacks (1)
Framework (1)
Governmentality (1)
Hardware (1)
Hardwareimplementation (1)
Hashfunctions (1)
Implementation (1)
Informationtheory (1)
Itinformationsecurity (1)
Keyenscrowment (1)
Mobilephones (1)
Operatingsystem (1)
Opticalcommunication (1)
Opticalsoliton (1)
Optimization (1)
Performance (1)
Performanceevaluation (1)
Physicallayersecurity (1)
Prepaidmobilephones (1)
Public-Keyinfrastructure (1)
Publickeycryptosystems (1)
Qos (1)
Qualityofservice(qos) (1)
Ringresonator (1)
Robustsecurity (1)
Rsa (1)
Rsacryptosystems (1)
Secretsharing (1)
Securerouting (1)
Securitypolicy (1)
Securityschemedesign (1)
SMS (1)
Solitonamplification (1)
Solitonarrays (1)
Sovereignty (1)
Steganography (1)
Ultra-Shortpulses (1)
Urity (1)
Windows (1)
Wirelesscommunications (1)
Wirelessnetworks (1)
Schlagwort-Sachbuch auswählen
Schlagwort Sachbuch
Kodierungstheorie und Verschlüsselung (kryptologie) (5)
Mathematik für Informatiker (3)
Festkörpermechanik (2)
Kybernetik und Systemtheorie (2)
Drahtlostechnologie (1)
E-Business (1)
E-Commerce (1)
Expertensysteme (1)
Kommunikationswissenschaft (1)
Laserphysik (1)
Wissensbasierte Systeme (1)
Sprache auswählen
Sprachen
Englisch (17)
Buchform auswählen (BC=Taschenbuch,BB=Gebunden)
Formate
Taschenbuch (13)
Gebunden (4)
Nur mit
-Notizen
Auf Lager
Sortiert nach
Übereinstimmung
Neueste
Preis absteigend
Preis aufsteigend
Seitenzahl aufsteigend
Seitenzahl absteigend
Suchergebnis
Gefundene Autoren:
Abdolkarim Afroozeh
oder
Iraj Sadegh Amiri
oder
Simone Fischer-Hübner
oder
Xiaohong Jiang
oder
Oliver Leistert
eng
Yulong Shen / Xiaohong Jiang …
Secrecy, Covertness and Authentication in Wireless Communications
Physical Layer Security Approach
Springer Nature Switzerland
2023
Gebunden
376 Seiten
192,59
€
in Kürze
eng
Secure Communication for 5G and IoT Networks
Springer International Publishing
2022
Taschenbuch
256 Seiten
139,09
€
in Kürze
This book highlights research on secure communication of 5G and the Internet of Things (IoT) Networks, along with related areas to ensure secure and …
eng
Secure Communication for 5G and IoT Networks
Springer International Publishing
2021
Gebunden
256 Seiten
139,09
€
in Kürze
eng
Abdolkarim Afroozeh / Iraj Sadegh Amiri
Ring Resonator Systems to Perform Optical Communication Enhancement Using Soliton
Springer Nature Singapore
2014
Taschenbuch
80 Seiten
53,49
€
in Kürze
The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. Th…
eng
Applications of Chaos and Nonlinear Dynamics in Science and Engineering - Vol. 2
Springer Berlin Heidelberg
2014
Taschenbuch
280 Seiten
106,99
€
in Kürze
Chaos and nonlinear dynamics initially developed as a new emergent field with its foundation in physics and applied mathematics. The highly generic, …
eng
Oliver Leistert
From Protest to Surveillance ¿ The Political Rationality of Mobile Media
Modalities of Neoliberalism
Peter Lang
2013
Gebunden
290 Seiten
74,60
€
in Kürze
The book won the Surveillance Studies Network Book Prize 2014. The book argues that the mobile as a political technology in a broad sense facilitates…
eng
Applications of Chaos and Nonlinear Dynamics in Science and Engineering - Vol. 2
Springer Berlin Heidelberg
2012
Gebunden
280 Seiten
106,99
€
in Kürze
Chaos and nonlinear dynamics initially developed as a new emergent field with its foundation in physics and applied mathematics. The highly generic, …
eng
Selected Areas in Cryptography
9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers
Springer Berlin Heidelberg
2003
Taschenbuch
424 Seiten
53,49
€
in Kürze
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen¿s University in Kingston (1994, …
eng
Security in Communication Networks
Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002, Revised Papers
Springer Berlin Heidelberg
2003
Taschenbuch
380 Seiten
53,49
€
in Kürze
The Third International Conference on Security in Communication Networks 2002 (SCN 2002) was held in the Salone Morelli of the Civic Museum of Amal?,…
eng
Topics in Cryptology - CT-RSA 2002
The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings
Springer Berlin Heidelberg
2002
Taschenbuch
328 Seiten
53,49
€
in Kürze
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers¿ Track (CT-RSA) of the yearly…
eng
Financial Cryptography
4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000 Proceedings
Springer Berlin Heidelberg
2001
Taschenbuch
396 Seiten
53,49
€
in Kürze
Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on…
eng
Cryptographic Hardware and Embedded Systems - CHES 2001
Third International Workshop, Paris, France, May 14-16, 2001 Proceedings
Springer Berlin Heidelberg
2001
Taschenbuch
432 Seiten
53,49
€
in Kürze
These are the proceedings of CHES 2001, the third Workshop on Cryptographic Hardware and Embedded Systems. The ?rst two CHES Workshops were held in M…
eng
Simone Fischer-Hübner
IT-Security and Privacy
Design and Use of Privacy-Enhancing Security Mechanisms
Springer Berlin Heidelberg
2001
Taschenbuch
372 Seiten
53,49
€
in Kürze
Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Be…
eng
Topics in Electronic Commerce
Second International Symposium, ISEC 2001 Hong Kong, China, April 26-28, 2001 Proceedings
Springer Berlin Heidelberg
2001
Taschenbuch
204 Seiten
53,49
€
in Kürze
The second International Symposium on Electronic Commerce was held in Hong Kong, April 2001, in conjunction with the fourth International Workshop on…
eng
Information Security
Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings
Springer Berlin Heidelberg
2000
Taschenbuch
340 Seiten
53,49
€
in Kürze
The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Cen…
eng
Information Security and Cryptology - ICISC'99
Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings
Springer Berlin Heidelberg
2000
Taschenbuch
296 Seiten
53,49
€
in Kürze
The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KI…
eng
Information Security
Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings
Springer Berlin Heidelberg
1999
Taschenbuch
296 Seiten
53,49
€
in Kürze
The 1999 International Information Security Workshop, ISW¿99, was held on Monash University¿s Malaysia Campus, which is about 20km to the south west …