Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Strong Secrecy for Wireless Channels (Invited Talk)
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Revisiting the Karnin, Greene and Hellman Bounds
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Upper Bounds for Set Systems with the Identifiable Parent Property
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk)
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Key Refreshing in Wireless Sensor Networks
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Oblivious Transfer Based on the McEliece Assumptions
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Interactive VoiceXML Module into SIP-Based Warning Distribution System
British Library Conference Proceedings | 2011|Schlagwörter: Computer security, Security -
Safety aspects of the production of foods and food ingredients from insects
Online Contents | 2017|Schlagwörter: Microbiological safety, Food safety -
Leading well: Leadership and employee safety and wellbeing
Online Contents | 2016Schlagwörter: Occupational safety -
Save : das Magazin für Sicherheit
TIBKAT | 1. Jahrgang, 1 (2023)-Schlagwörter: Technische Sicherheit -
Susceptible Two-Party Quantum Computations
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Inspection of medical sevices : for regulatory purposes
TIBKAT | 2024|Schlagwörter: Technische Sicherheit -
Waters Signatures with Optimal Security Reduction
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Secure IT systems : 28th Nordic conference, NordSec 2023, Oslo, Norway, November 16-17, 2023 : proceedings
TIBKAT | 2024|Schlagwörter: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Cyber situational awareness through network anomaly detection: state of the art and new approaches
Tema Archiv | 2015|Schlagwörter: IT-Sicherheit, Sicherheit, nationale Sicherheit -
Scalable packet classification with controlled cross-producting
Tema Archiv | 2009|Schlagwörter: Sicherheit -
Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Display design to support efficient search in safety risk identification for supervisory control of unmanned aerial vehicles
TIBKAT | 2023|Schlagwörter: Sicherheit -
Cybersecurity: Of Heterogeneity and Autarky
British Library Conference Proceedings | 2005|Schlagwörter: Cyber security, Computer security., Computer security -
Multiterminal Secrecy Generation and Tree Packing
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Linear Threshold Multisecret Sharing Schemes
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Enhancing Security in Medical Image Communication with JPEG2000 Compression and Lossless Watermarking
Tema Archiv | 2013|Schlagwörter: medizinische Sicherheit, Sicherheit -
Hierarchical Identity-Based Signature with Short Public Keys
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Cryptanalysis of Secure Message Transmission Protocols with Feedback
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Router Attack toward NoC-enabled MPSoC and Monitoring Countermeasures against such Threat
Online Contents | 2015|Schlagwörter: Hardware security, Multiprocessor System-on-Chip security, Network-on-Chip security -
Security Region Based Dynamic Security Risk Assessment of Power Transmission System
Tema Archiv | 2012|Schlagwörter: security region, dynamic security -
Funknetze sicher planen. Ganzheitliche Abdeckung und Zugriffssicherheit als Herausforderung
Tema Archiv | 2009|Schlagwörter: WLAN-Sicherheit, Sicherheit -
Provable Security for the Fuzzy Fingerprint Vault
Tema Archiv | 2010|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Forschung und Entwicklung sowie Realisierung von kosteneffektiven Prüfverfahren zum Nachweis der Sicherheitsanforderungen von Traktionsbatterien und deren elektrischer Peripherien. Abschlussbericht. Batterietestzentrum P 10. Laufzeit des Vorhabens: 1.10.2011 bis 31.08.2011
Tema Archiv | 2011|Schlagwörter: Sicherheit, elektrische Sicherheit -
A Golden Age of Security and Education? Adult Education for Civil Defence in the United States 1950-1970
Online Contents | 2015|Schlagwörter: National security, security -
Code-Based Public-Key Cryptosystems and Their Applications
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Secure relay selection based on learning with negative externality in wireless networks
Tema Archiv | 2013|Schlagwörter: Sicherheit -
Survey: Leakage Resilience and the Bounded Retrieval Model
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Group Testing and Batch Verification
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Construction safety personnel's perceptions of safety training practices
Online Contents | 2015|Schlagwörter: Construction accidents & safety, Safety management, Safety training -
The Optimum Leakage Principle for Analyzing Multi-threaded Programs
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Information Theoretic Security Based on Bounded Observability
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
On the Optimization of Bipartite Secret Sharing Schemes
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
What Can Cryptography Do for Coding Theory?
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security -
Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading
British Library Conference Proceedings | 2010|Schlagwörter: Database security, Computer security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.