Erscheinungsjahr
Medientyp
Datenquelle
Fach
- ‹ Alle Fächer
- Elektrotechnik (22.430)
- Informatik (5.353)
- Physik (3.143)
- Maschinenbau, Energietechnik (1.450)
- Verkehrstechnik, Verkehrswesen (1.330)
- Wirtschaftswissenschaften (880)
- Mathematik (584)
- Chemie (580)
- Sozialwissenschaften (381)
- Werkstoffkunde (303)
- Bautechnik (278)
- Chemische und Umwelttechnik (220)
- Medizintechnik (196)
- Biowissenschaften, Biologie (108)
- Bergbau (95)
- Weitere Fächer (61)
- Technik (53)
- Rechtswissenschaften (52)
- Geowissenschaften, Geographie (28)
- Sprachwissenschaften (24)
- Architektur (23)
- Gartenbau (18)
- Literaturwissenschaften (14)
- Erziehungswissenschaften (14)
- Medizin (6)
- Geschichte (3)
- Philosophie (1)
Sprache
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
1–50 von 22.452 Ergebnissen
Sortieren:
Sortieren:
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archiv | 2013|Schlagwörter: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Limits of Provable Security for Homomorphic Encryption
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archiv | 2013|Schlagwörter: passive Sicherheit, aktive Sicherheit -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
On the Feasibility of Extending Oblivious Transfer
Tema Archiv | 2013|Schlagwörter: Sicherheit, statische Sicherheit -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Provably Secure Higher-Order Masking of AES
Tema Archiv | 2011|Schlagwörter: physikalische Security, Sicherheit, beweisbare Sicherheit -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Schlagwörter: National security, Computer security -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Online Contents | 2015|Schlagwörter: Security zones, Mobile security -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Worldwide cyber security
British Library Conference Proceedings | 2012|Schlagwörter: Cyber security, Security -
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Schlagwörter: National security, Computer security -
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archiv | 2007|Schlagwörter: Sicherheit, beweisbare Sicherheit -
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Online Contents | 2010|Schlagwörter: security policy, security mangement, network security, security modeling -
30 Jahre Hochleistungsbahnen in Österreich - Bilanz und Ausblick : 17. Wiener Eisenbahnkolloquium, 14.-15. März 2019
TIBKAT | 2019|Schlagwörter: Technische Sicherheit -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Schlagwörter: Safety PLC, Safety integrity, Safety function -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Tema Archiv | 2014|Schlagwörter: Sicherheit -
SENTINEL: Securing Legacy Firefox Extensions
Tema Archiv | 2015|Schlagwörter: Web-Browser-Sicherheit, Browser-Sicherheit -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Authenticated Encryption: How Reordering Can Impact Performance
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
SecIVo: a quantitative security evaluation framework for internet voting schemes
Online Contents | 2016|Schlagwörter: Security requirements, Security evaluation -
A new method of evaluating robust power system security against uncertainties
Online Contents | 2015|Schlagwörter: probabilistic security assessment, power system security, deterministic security assessment -
A collaborative policy-based security scheme to enforce resource access controlling mechanism
Online Contents | 2019|Schlagwörter: Security policy, Android system security, Security profile -
Sicherheit im Eisenbahnbetrieb : 15. Wiener Eisenbahnkolloquium, 9.-10. März 2017
TIBKAT | 2017|Schlagwörter: Technische Sicherheit -
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
SUNSHINE - Schutz vor Missbrauch und Bedrohung von VoIP-Netzwerken : Schlussbericht FOKUS ; Berichtszeitraum: 01.05.2011 - 31.07.2013
TIBKAT | 2013|Schlagwörter: Sicherheit -
Security and management framework for an organization operating in cloud environment
Online Contents | 2017|Schlagwörter: Security framework for cloud, Security for cloud, Security requirements for cloud environment, Security and management framework for cloud -
Security of the Internet of Things: perspectives and challenges
Tema Archiv | 2014|Schlagwörter: Sicherheit -
Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Electrical product compliance and safety engineering ; Volume 2
TIBKAT | 2021|Schlagwörter: Technische Sicherheit -
Leakage Resilience of the Blom's Key Distribution Scheme
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Modulus Computational Entropy
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Detection of Algebraic Manipulation in the Presence of Leakage
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
New Lower Bounds for Privacy in Communication Protocols
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
The Application of Dispatch Operation Ticket System Based on Intelligent Anti-Misoperation Method
Tema Archiv | 2013|Schlagwörter: elektrische Sicherheit, Sicherheit -
Everlasting Multi-party Computation
Tema Archiv | 2013|Schlagwörter: Sicherheit, immerwährende Sicherheit -
Broadcast (and Round) Efficient Verifiable Secret Sharing
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Superposition Attacks on Cryptographic Protocols
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Technik-Verantwortung : Sicherheitspflichten der Ingenieure, Meister und Fachkräfte - Organisation und Aufsicht durch Management und Führungskräfte
TIBKAT | 2022|Schlagwörter: Sicherheit, Technische Sicherheit -
Security officers’ attitudes towards training and their work environment
Online Contents | 2016|Schlagwörter: Security management, Security personnel -
Entwicklung eines Security Tokens zur Sicherstellung der Systemintegrität in Selbstbedienungsautomaten : Abschlussbericht von Morpho für das Projekt SiS
TIBKAT | 2012|Schlagwörter: Sicherheit -
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Secure Two-Party Computation: A Visual Way
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security