*sublabel_Solr*
*custom_text_above_search_result**custom_text_above_search_result_Solr*
*Showing* 1 - 8
*of* 8
*custom_text_below_search_result*
*Narrow Search*
*facet_topic_facet*
Konferenzschrift
5
Computersicherheit
2
Kryptoanalyse
2
Kryptosystem
2
Rechnernetz
2
Sicherheitsprotokoll
2
*more* ...
Authentifikation
1
Automatische Identifikation
1
Composite Applications
1
Computerforensik
1
Datensicherung
1
Dienstgüte
1
Dienstverwaltung
1
Hochschulschrift
1
Kundenorientierung
1
Malware
1
Prozessmanagement
1
Requirements engineering
1
Schlüsselverteilung
1
Servicegrad
1
Serviceorientierte Architektur
1
Web Services
1
*less* ...
*facet_material_brief*
*facet_author_facet*
Chell, Dominic
1
Colley, Shaun
1
Elleithy, Khaled
1
Emura, Keita
1
Erasmus, Tyrone
1
Fantinato, Marcelo
1
*more* ...
Gupta, Isha
1
Huang, Xinyi
1
Iskander, Magued
1
Kapila, Vikram
1
Karim, Mohammad A
1
Kumar, Amit
1
Lee, Jong-Hyouk
1
Lee, Sokjoon
1
Lopez, Javier
1
Maglio, Paul P
1
Mahmood, Ausif
1
Malhotra, Shivani
1
Pal, Shantanu
1
Pradel, Michael
1
Ryan, Peter Y. A
1
Sabelfeld, Andrei
1
Sako, Kazue
1
Salvaneschi, Guido
1
Sandhu, Ravi
1
Schneider, Steve
1
Sobh, Tarek
1
Staicu, Cristian-Alexandru
1
Weske, Mathias
1
Whitehouse, Ollie
1
*less* ...
*facet_language*
*facet_publish_date*
*Filter*