Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
101–150 of 718 hits
Sort by:
Sort by:
-
20 Datenströme auf einem Lichtwellenleiter. IBM betrachtet MuxMaster als ersten Schritt zum rein optischen Networking
Tema Archive | 1995Keywords: Datensicherheit -
Elektronischer Copyright-Schutz. Die holographische Urheber-Signatur findet sich auch in Raubkopien
Tema Archive | 1995Keywords: Datensicherheit -
Relationships among nonlinearity criteria of Boolean functions
Tema Archive | 1995|Keywords: Datensicherheit -
Comparing inference control mechanisms for statistical databases with emphasis on randomizing
Tema Archive | 1995|Keywords: Datensicherheit -
Solving constraint satisfaction problems by binary decision diagram
Tema Archive | 1995|Keywords: Datensicherheit -
Recent advances in theory and applications of scrambling techniques for lightwave transmission
Tema Archive | 1995|Keywords: Datensicherheit -
Predicting chaos through an harmonic balance technique: An application to the time-delayed Chua's circuit
Tema Archive | 1996|Keywords: Datensicherheit -
Hybrid method for modular exponentiation with precomputation
Tema Archive | 1996|Keywords: Datensicherheit -
Neue Konzepte in der Zählerablesung DFÜ-System im Einsatz bei Versorgungsunternehmen
Tema Archive | 1996|Keywords: Datensicherheit -
On-line handwritten signature verification using stroke direction coding
Tema Archive | 1996|Keywords: Datensicherheit -
Hybrid wavelength hopping/time spreading code division multiple access systems
Tema Archive | 1996|Keywords: Datensicherheit -
Distributed kinoforms in optical security applications
Tema Archive | 1996|Keywords: Datensicherheit -
Schon von weitem. Fernwirken im Umbruch: Neue Märkte im Visier
Tema Archive | 1996Keywords: Datensicherheit -
Combinatorial bounds and design of broadcast authentication
Tema Archive | 1996|Keywords: Datensicherheit -
Optical implementation of image encryption using random phase encoding
Tema Archive | 1996|Keywords: Datensicherheit -
Technische Sicherheitsmechanismen in Point-Of-Sale (POS)-Systemen (Teil 2)
Tema Archive | 1996|Keywords: Datensicherheit -
Position-invariant two-dimensional image correlation using a one-dimensional space integrating optical processor: application to security verification
Tema Archive | 1996|Keywords: Datensicherheit -
Low-density diffractive optical memories for document security
Tema Archive | 1996|Keywords: Datensicherheit -
Fahndung per Glasfaser. Polizei München modernisiert Netzinfrastruktur
Tema Archive | 1996|Keywords: Datensicherheit -
Real-time optically processed face recognition system based on arbitrary moire contours
Tema Archive | 1996|Keywords: Datensicherheit -
Photonic security system using spatial codes and remote coded coherent optical communications
Tema Archive | 1996|Keywords: Datensicherheit -
Using BAN logic for the proof of a network address registration protocol
Tema Archive | 1996|Keywords: Datensicherheit -
Generating statistical information in anonymous surveys
Tema Archive | 1996|Keywords: Datensicherheit -
Protecting ownership rights through digital watermarking
Tema Archive | 1996|Keywords: Datensicherheit -
Der ultimative Packer-Ratgeber. Alles über Datenkompression
Tema Archive | 1996|Keywords: Datensicherheit -
Combining code division multiplexing and coherence multiplexing for private communications in optical fiber multiple access networks
Tema Archive | 1996|Keywords: Datensicherheit -
Neue Rechenkünstler. 'Simatic' steht jetzt auch für Industrie-PCs
Tema Archive | 1996|Keywords: Datensicherheit -
Coherent optical code division multiple access system for LANs
Tema Archive | 1996|Keywords: Datensicherheit -
Using Timed CSP during object oriented design of real-time systems
Tema Archive | 1996|Keywords: Datensicherheit -
A security of a watermarking for copyright protection using wavelet transform
Tema Archive | 1997|Keywords: Datensicherheit -
20-Byte-Speicher mit MO-Technik. Near Field Recording: Olympus kooperiert mit Terastor
Tema Archive | 1997Keywords: Datensicherheit -
Digitale Unterschrift und Kryptosysteme wiegen die Smart Card in Sicherheit. Asymmetrische On-Chip-Sicherheitsalgorithmen lassen Hacker nicht zum Zug kommen
Tema Archive | 1997|Keywords: Datensicherheit -
Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using wavelength-division multiplexing
Tema Archive | 1997|Keywords: Datensicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.