X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
security (5) 5
authentication (4) 4
privacy (4) 4
telecommunications (4) 4
computer science, information systems (2) 2
cryptography (2) 2
eavesdropping (2) 2
information systems (2) 2
information technology (2) 2
internet of things (2) 2
medical services (2) 2
access control (1) 1
aggregate signature (1) 1
algorithms (1) 1
architecture (1) 1
attack (1) 1
ausleuchtung (1) 1
authenticated key agreement (1) 1
authentication protocol (1) 1
authentication provision (1) 1
authenticity (1) 1
authentifizierung (1) 1
authentifizierungsprotokoll (1) 1
bilanzgleichung (1) 1
biomedical monitoring (1) 1
body sensor networks (1) 1
broadcast (1) 1
burrows (1) 1
certificateless signature (1) 1
chaotic map (1) 1
chemical technology (1) 1
chemistry, analytical (1) 1
communication (1) 1
communications engineering, networks (1) 1
competitive environment (1) 1
computer communication networks (1) 1
computer information security (1) 1
computer network protocols (1) 1
computer security (1) 1
computer-leistung (1) 1
content oriented privacy (1) 1
contextual privacy (1) 1
data authenticity (1) 1
data encryption (1) 1
data integrity (1) 1
digital signatures (1) 1
diseases (1) 1
dynamic identity (1) 1
ehealth system (1) 1
ehealth system, security and privacy, content oriented privacy, contextual privacy, strong global eavesdropping (1) 1
electrochemistry (1) 1
energy consumption (1) 1
energy efficiency (1) 1
energy management systems (1) 1
energy use (1) 1
engineering (1) 1
engineering, electrical & electronic (1) 1
gain-switched semiconductor laser (1) 1
hacking (1) 1
halbleiterdiode (1) 1
halbleiterlaser (1) 1
health care (1) 1
health informatics (1) 1
health-care (1) 1
hospitals (1) 1
index medicus (1) 1
information security (1) 1
instruments & instrumentation (1) 1
integrity (1) 1
international conferences (1) 1
internet (1) 1
lagerkosten (1) 1
less signature (1) 1
lightweight (1) 1
management science (1) 1
manet (1) 1
medical treatment (1) 1
medicine & public health (1) 1
message frame (1) 1
messages (1) 1
multi-server (1) 1
mutual collaboration (1) 1
networks (1) 1
optics (1) 1
packets (1) 1
patient monitoring (1) 1
permutations (1) 1
photon (1) 1
physics - optics (1) 1
protocol (1) 1
provable security (1) 1
provably-secure (1) 1
public key infrastructure (1) 1
quality of life (1) 1
quantum key distribution (1) 1
quantum physics (1) 1
radio frequency (1) 1
radio frequency identification (1) 1
random numbers (1) 1
rate equation (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Optics Communications, ISSN 0030-4018, 07/2018, Volume 419, pp. 83 - 89
The temperature of the semiconductor diode increases under strong light illumination whether thermoelectric cooler is installed or not, which changes the... 
Gain-switched semiconductor laser | Quantum key distribution | Strong light illumination | Rate equation | ATTACK | OPTICS | HACKING | CRYPTOGRAPHY
Journal Article
Journal of Medical Systems, ISSN 0148-5598, 11/2019, Volume 43, Issue 11, pp. 1 - 13
Journal Article
Wireless Personal Communications, ISSN 0929-6212, 9/2017, Volume 96, Issue 1, pp. 1215 - 1228
Journal Article
Security and Communication Networks, ISSN 1939-0114, 11/2016, Volume 9, Issue 16, pp. 3314 - 3323
The wireless sensor network (WSN) is more vulnerable than the wired network because it is relatively easy for an adversary to eavesdrop, insert, alter, and... 
sensor network security | energy efficiency | strong replay protection | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Energy consumption | Wireless sensor networks | Energy efficiency | Energy use | Sensors | Energy management systems | Remote sensors | Networks | Permutations | Architecture | Authentication | Packets (communication) | Security
Journal Article
Security and Communication Networks, ISSN 1939-0114, 10/2012, Volume 5, Issue 10, pp. 1147 - 1158
ABSTRACT A mobile ad hoc network (MANET) is a type of wireless network without any infrastructure, where nodes must adapt to the changing dynamic situations... 
broadcast | MANET | access control | ZKP | strong authentication | Access control | Strong authentication | Broadcast | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Management science | Algorithms
Journal Article
01/2009, ISBN 1848211171, 46
This chapter contains sections titled: Introduction Signaling Security in the GSM GPRS security 3G security Network interconnection Conclusion Bibliography 
strong monopoly | message frame | competitive environment | authentication provision | mutual collaboration | Strong monopoly | Authentication provision | Mutual collaboration | Message frame | Competitive environment
Book Chapter
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.