Priporočene teme znotraj vašega iskanja.
Priporočene teme znotraj vašega iskanja.
Poišči alternative:
authentication trusted » authentication system, authentication tests, authentication trees
authentication based » authentication codes, authentication scheme, authentication _
designs data » design data, designing data, designs a
data centers » data center, data centric
authentication trusted » authentication system, authentication tests, authentication trees
authentication based » authentication codes, authentication scheme, authentication _
designs data » design data, designing data, designs a
data centers » data center, data centric
1
Izdano 2015
Kazalo:
“... Students Based on Eye Movement Data Analysis -- A Dictionary Learning Method Based on Self-adaptive...”Polni tekst
Elektronski
eKnjiga
2
Izdano 2005
Kazalo:
“... Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release...”Polni tekst
Elektronski
eKnjiga
3
Izdano 2012
Kazalo:
“... Association-Rule Mining Algorithm -- An Algorithm of Parallel Programming Design Based on Problem Domain Model...”Polni tekst
Elektronski
eKnjiga
4
Izdano 2005
Kazalo:
“... Preserving Anonymity -- Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent...”Polni tekst
Elektronski
eKnjiga
5
Izdano 2007
Kazalo:
“... Method Based Trusted Overlay for Information Retrieval over Networks -- Managing a Geographic Database...”Polni tekst
Elektronski
eKnjiga
6
Izdano 2015
Kazalo:
“... Rehabilitation Process; S.Salim, et al -- A Security Protocol based-on Mutual Authentication Application toward...”Polni tekst
Elektronski
eKnjiga
7
Izdano 2010
Kazalo:
“... Medical Department Research Centers -- Data Warehouse Based Knowledge Management Controlling -- Business...”Polni tekst
Elektronski
eKnjiga
8
Izdano 2005
Kazalo:
“...Information Technology Security -- How can we justify trust in software based systems...”Polni tekst
Elektronski
eKnjiga
9
Kazalo:
“...Introduction -- Trustworthy Computing.- Requirements for Trustworthiness -- Design Security...”
Polni tekst
Polni tekst
Elektronski
eKnjiga
10
Izdano 2006
Kazalo:
“...-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks -- An Energy...”Polni tekst
Elektronski
eKnjiga
11
Izdano 2008
Kazalo:
“... Information Access: The Other Side of the Social Web -- Designing Adaptive Web Applications -- Best of Both...”Polni tekst
Elektronski
eKnjiga
12
Izdano 2010
Kazalo:
“...Information and Data Management -- A New Approach for Fingerprint Matching Using Logic Synthesis...”Polni tekst
Elektronski
eKnjiga
13
Izdano 2007
Kazalo:
“...: Collective Wish-Making and Social Cohesion -- Computing Social Networks for Information Sharing: A Case-Based...”Polni tekst
Elektronski
eKnjiga
14
Izdano 2014
Kazalo:
“..., Y. C. Kim -- Context Aware Based Access Control Model In Cloud Data Center Environment; Y.S. Byun...”Polni tekst
Elektronski
eKnjiga



