Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...


Proceedings. Frontiers in Education. 36th Annual Conference, 2006, p.1-6
2006

2012 International Conference for Internet Technology and Secured Transactions, 2012, p.488-491
2012

2009 First International Conference on Networked Digital Technologies, 2009, p.469-475
2009

2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009, p.1-8
2009

2009 First International Conference on Networked Digital Technologies, 2009, p.201-209
2009

2009 First International Conference on Networked Digital Technologies, 2009, p.280-285
2009

2010 International Conference for Internet Technology and Secured Transactions, 2010, p.1-3
2010

2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009, p.1-6
2009

2010 International Conference for Internet Technology and Secured Transactions, 2010, p.1-3
2010

2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009, p.1-6
2009

2010 International Conference for Internet Technology and Secured Transactions, 2010, p.1-2
2010

2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009, p.1-8
2009

2007 2nd International Conference on Pervasive Computing and Applications, 2007, p.521-526
2007

2009 First International Conference on Networked Digital Technologies, 2009, p.373-378
2009


Electronic Healthcare Information Security, 2010, Vol.53
2010
Link zum Volltext

Electronic Healthcare Information Security, 2010, Vol.53
2010
Link zum Volltext

Securing e-Healthcare Information
Electronic Healthcare Information Security, 2010, Vol.53
2010
Link zum Volltext

Electronic Healthcare Information Security, 2010, Vol.53
2010
Link zum Volltext

Electronic Healthcare Information Security, 2010, Vol.53
2010
Link zum Volltext

2007 2nd International Conference on Digital Information Management, 2007, Vol.1, p.165-172
2007