Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archiv | 2013|Schlagwörter: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map
Online Contents | 2018|Schlagwörter: Image security, Security analysis -
Die Polizei : unabhängige, interdisziplinäre Fachzeitschrift für öffentliche und private Sicherheit
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 1.1904 - 38.1941,10(Mai); N.S. 1[=39].1948 - 7=45.1954,24; 51.1960,4 -|Schlagwörter: Innere Sicherheit, Sicherheit und Ordnung -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Limits of Provable Security for Homomorphic Encryption
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archiv | 2013|Schlagwörter: passive Sicherheit, aktive Sicherheit -
On the Feasibility of Extending Oblivious Transfer
Tema Archiv | 2013|Schlagwörter: Sicherheit, statische Sicherheit -
Cyberspace and Innocent Passage: Regulations for the Security of the Coastal State
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Data Mining and Association Rules to Determine Twitter Trends
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Performance Evaluation of a Hybrid Vehicle and Sensor Network to Prevent Traffic Accidents
TIBKAT | 2020|Schlagwörter: National security, Computer security -
3D computational ghost imaging (Invited Paper) [8899-1]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Online Contents | 2010|Schlagwörter: security policy, security mangement, network security, security modeling -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Monte Carlo-Based Localization for Kidnapped Robot Problem
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Truly random number generation: an example [8899-30]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Determination of Optimal Procedures for Maintenance and Repair Operations of the GDU-620 Garmin Applied to the DA20C-1 Aircraft
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Schlagwörter: National security, Computer security -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Essential elements lacking in security proofs for quantum key distribution (Invited Paper) [8899-21]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Online Contents | 2015|Schlagwörter: Security zones, Mobile security -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Ackermann UGV with 2D Mapping for Unknown Environments
TIBKAT | 2020|Schlagwörter: National security, Computer security -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Schlagwörter: Safety PLC, Safety integrity, Safety function -
Towards a high-speed quantum random number generator [8899-29]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Expert Nutritional System for Military Athletes Based on Fuzzy Logic and Inferential Statistics
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Citizen confidence in private security guards in Portugal
Online Contents | 2015|Schlagwörter: private security, private security guards, Citizen confidence in private security guards, perceptions of private security guards, Security services -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Worldwide cyber security
British Library Conference Proceedings | 2012|Schlagwörter: Cyber security, Security -
The Scandinavian Approach to Private Maritime Security-A Regulatory Façade?
Online Contents | 2015|Schlagwörter: private security, National security, Security management, maritime security, Security services -
Provably Secure Higher-Order Masking of AES
Tema Archiv | 2011|Schlagwörter: physikalische Security, Sicherheit, beweisbare Sicherheit -
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archiv | 2007|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Security and management framework for an organization operating in cloud environment
Online Contents | 2017|Schlagwörter: Security framework for cloud, Security for cloud, Security requirements for cloud environment, Security and management framework for cloud -
Die Polizei : unabhängige, interdisziplinäre Fachzeitschrift für öffentliche und private Sicherheit
TIBKAT | 1.1904 - 38.1941,10(Mai); N.S. 1[=39].1948 - 7=45.1954,24; 51.1960,4 -|Schlagwörter: Innere Sicherheit, Sicherheit und Ordnung -
SecIVo: a quantitative security evaluation framework for internet voting schemes
Online Contents | 2016|Schlagwörter: Security requirements, Security evaluation -
Resilience Engineering's Potential for Advanced Air Mobility (AAM)
NTRS | 2021|Schlagwörter: Safety-II, Air Transportation And Safety, Aviation Safety -
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
A new method of evaluating robust power system security against uncertainties
Online Contents | 2015|Schlagwörter: probabilistic security assessment, power system security, deterministic security assessment -
A collaborative policy-based security scheme to enforce resource access controlling mechanism
Online Contents | 2019|Schlagwörter: Security policy, Android system security, Security profile -
Sicherheitsverfassung - Sicherheitsrecht : Festgabe für Kurt Graulich zum 70. Geburtstag
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2019|Schlagwörter: Innere Sicherheit, Sicherheit und Ordnung -
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Water security in the Canadian Prairies: science and management challenges
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Authenticated Encryption: How Reordering Can Impact Performance
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.