Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...

IEEE transactions on biomedical engineering, 2017-06, Vol.64 (6), p.1400-1411
2017


IEEE transactions on information forensics and security, 2019-07, Vol.14 (7), p.1887-1901
2019


IEEE transactions on emerging topics in computing, 2021-10, Vol.9 (4), p.2125-2138
2021


IEEE transactions on network science and engineering, 2022-09, Vol.9 (5), p.3411-3420
2022

IEEE transactions on industrial informatics, 2024-05, Vol.20 (5), p.7732-7743
2024

IEEE transactions on dependable and secure computing, 2022-05, Vol.19 (3), p.1505-1517
2022

IEEE transactions on dependable and secure computing, 2016-11, Vol.13 (6), p.657-671
2016


IEEE access, 2019, Vol.7, p.102951-102965
2019
Link zum Volltext

IEEE transactions on industrial electronics (1982), 2012-01, Vol.59 (1), p.629-637
2012

IEEE transactions on dependable and secure computing, 2017-01, Vol.14 (1), p.83-94
2017

IEEE transactions on dependable and secure computing, 2017-03, Vol.14 (2), p.211-220
2017

IEEE transactions on computers, 2007-09, Vol.56 (9), p.1292-1296
2007

IEEE pervasive computing, 2014-04, Vol.13 (2), p.52-60
2014


Computer (Long Beach, Calif.), 2009-05, Vol.42 (5), p.33-40
2009


IEEE transactions on information theory, 2008-05, Vol.54 (5), p.2026-2040
2008

IEEE transactions on information forensics and security, 2007-06, Vol.2 (2), p.164-173
2007


Cryptography on a Speck of Dust
Computer (Long Beach, Calif.), 2007-02, Vol.40 (2), p.38-44
2007
Aktive Filter
SpracheChinesisch
SpracheDeutsch
KollektionIEEE Xplore
ThemaCryptography