//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~isPartOf:"E-business and telecommunications : 4th international conference ; revised selected papers"
~isPartOf:"Information diffusion management and knowledge sharing ; volume 1"
~person:"Chalkias, K."
~person:"Koblensky, Mingyur"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"User access control"
Narrow search
Delete all filters
| 4 applied filters
Year of publication
From:
To:
Subject
All
Computer network
2
Computernetz
2
Data security
2
Datensicherheit
2
Theorie
2
Theory
2
User access control
2
Zutrittskontrolle
2
IT crime
1
IT-Kriminalität
1
Mobile Anwendung
1
Mobile application
1
more ...
less ...
Type of publication
All
Article
2
Type of publication (narrower categories)
All
Aufsatz im Buch
2
Book section
2
Language
All
English
2
Author
All
Chalkias, K.
Koblensky, Mingyur
Baldimtsi, F.
1
Bar-Josef, Noa
1
Božović, Vladimir
1
Böttcher, Stefan
1
Chandra, Satish
1
Debbabi, Mourad
1
Ferrante, Alberto
1
Hristu-Varsakelis, D.
1
Kedjar, Saadia
1
Kiyomoto, Shinsaku
1
Lakaraju, Sandeep
1
Laverdière, Marc-André
1
Li, Jing
1
Loreti, Michele
1
Manganaro, Andrea
1
Mourad, Azzam
1
Obermeier, Sebastian
1
Omote, Kazumasa
1
Piuri, Vincenzo
1
Sakurai, Kouichi
1
Sampalli, Srinivas
1
Shimoyama, Takeshi
1
Socek, Daniel
1
Stephanides, G.
1
Tanaka, Toshiaki
1
Tao, Kai
1
Tari, Abdelkamel
1
Torii, Satoru
1
Wang, Yong
1
Wool, Avishai
1
Xu, Dianxiang
1
Ćulibrk, Dubravko
1
more ...
less ...
Published in...
All
E-business and telecommunications : 4th international conference ; revised selected papers
Information diffusion management and knowledge sharing ; volume 1
Source
All
ECONIS (ZBW)
2
Showing
1
-
2
of
2
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K.
;
Baldimtsi, F.
;
Hristu-Varsakelis, D.
; …
- In:
E-business and telecommunications : 4th international …
,
(pp. 227-238)
.
2008
Persistent link: https://www.econbiz.de/10003803922
Saved in:
2
Design of a password-based EAP method
Manganaro, Andrea
;
Koblensky, Mingyur
;
Loreti, Michele
- In:
E-business and telecommunications : 4th international …
,
(pp. 343-355)
.
2008
Persistent link: https://www.econbiz.de/10003804268
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->