Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Security Optimization of DF Relay Selection Strategy Under Outdated Scenarios
Online Contents | 2021|Schlagwörter: Physical layer security, Security outage probability, Average security capacity -
A review, simple meta-analysis and future directions of safety climate research in manufacturing organizations
Taylor & Francis Verlag | 2020|Schlagwörter: safety climate, safety culture -
Occupational safety and health management in the construction industry: a review
Taylor & Francis Verlag | 2018|Schlagwörter: construction safety, safety management -
The Freedom to Choose Secure Attachment Relationships in Adulthood
Taylor & Francis Verlag | 2013|Schlagwörter: attachment security, attachment–security hypothesis -
CyberGuarder: A virtualization security assurance architecture for green cloud computing
Elsevier | 2011|Schlagwörter: Virtual security appliance, Security isolation -
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Authenticated Encryption: How Reordering Can Impact Performance
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Approximate Computing and Its Application to Hardware Security
Springer Verlag | 2018|Schlagwörter: Security, Crime Control and Security, Security Science and Technology -
The dynamic interplay of physical and psychosocial safety climates in frontline healthcare
Wiley | 2019|Schlagwörter: psychosocial safety climate, safety climate, safety incidents -
30 Jahre Hochleistungsbahnen in Österreich - Bilanz und Ausblick : 17. Wiener Eisenbahnkolloquium, 14.-15. März 2019
TIBKAT | 2019|Schlagwörter: Technische Sicherheit -
A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things
Elsevier | 2020|Schlagwörter: Security -
Generic modelling of security awareness in agent based systems
Elsevier | 2013|Schlagwörter: Security awareness, Security modelling -
Gamification Techniques for Raising Cyber Security Awareness
Springer Verlag | 2019|Schlagwörter: Security awareness, Usable security, Human-centered cyber security, Systems and Data Security, Security Services -
Security, privacy and trust in Internet of Things: The road ahead
Elsevier | 2014|Schlagwörter: Security -
A Fast Image Encryption Algorithm Based on Convolution Operation
Taylor & Francis Verlag | 2019|Schlagwörter: Information security, Security analysis -
The psychology of password management: a tradeoff between security and convenience
Taylor & Francis Verlag | 2010|Schlagwörter: password security, Internet security -
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Springer Verlag | 2021|Schlagwörter: Information security culture, Information security assessment, Information security cost, Information security evaluation, Information security, The ARCS security framework -
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
Springer Verlag | 2020|Schlagwörter: Tight security, Multi-challenge security, Chosen-ciphertext security, Security Services, Mobile and Network Security -
Leakage Resilience of the Blom's Key Distribution Scheme
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Modulus Computational Entropy
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Corporate security in film: Beyond the green shack out back
Online Contents | 2016|Schlagwörter: Security systems, Security management -
Video-assisted surgery: suggestions for failure prevention in laparoscopic cholecystectomy
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
On (k, n) Visual Cryptography Scheme with t Essential Parties
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Perspectives on healthcare safety and quality: selected papers from the 2nd Nordic Conference on Research in Patient Safety and Quality in Healthcare
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Detection of Algebraic Manipulation in the Presence of Leakage
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
New Lower Bounds for Privacy in Communication Protocols
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Tema Archiv | 2014|Schlagwörter: Sicherheit -
How to Construct Strongly Secure Network Coding Scheme
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Secure Two-Party Computation: A Visual Way
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
SENTINEL: Securing Legacy Firefox Extensions
Tema Archiv | 2015|Schlagwörter: Web-Browser-Sicherheit, Browser-Sicherheit -
Electrical product compliance and safety engineering ; Volume 2
TIBKAT | 2021|Schlagwörter: Technische Sicherheit -
Insider-Proof Encryption with Applications for Quantum Key Distribution
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
What are the trend and core knowledge of information security? A citation and co-citation analysis
Elsevier | 2023|Schlagwörter: Information security, Security policy -
A path analysis model of individual variables predicting safety behavior and human error: The mediating effect of situation awareness
Elsevier | 2021|Schlagwörter: Safety behavior, Safety performance -
Validating a Safety Climate Model in Metal Processing Industries: A Replication Study
Taylor & Francis Verlag | 2013|Schlagwörter: safety climate, safety climate model, safety performance -
Cloud computing adoption framework: A security framework for business clouds
Elsevier | 2015|Schlagwörter: CCAF multi-layered security, Security for business clouds -
Rule-Based Security Capabilities Matching for Web Services
Online Contents | 2013|Schlagwörter: Security ontology, Semantic security -
Perfectly-Secure MPC Tolerating General Adversaries
Springer Verlag | 2022|Schlagwörter: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud
Springer Verlag | 2020|Schlagwörter: Security analysis, Security modeling, Cloud security framework, Systems and Data Security, Security Services, Mobile and Network Security -
A machine learning low‐dropout regulator‐assisted differential power analysis attack countermeasure with voltage scaling
Wiley | 2023|Schlagwörter: hardware security, security analysis -
Broadcast (and Round) Efficient Verifiable Secret Sharing
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Superposition Attacks on Cryptographic Protocols
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
Springer Verlag | 2013|Schlagwörter: CoAP security, end-to-end application-layer security, message security, granular security, Systems and Data Security -
Sicherheit im Wohnumfeld - Auswertung der Befragung zum Sicherheitsempfinden im Wohnumfeld
DataCite | 2015|Schlagwörter: Sicherheit , Wohnen -
Measuring cyber secure behavior of elementary and high school students in the Netherlands
Elsevier | 2022|Schlagwörter: Information security behavior, Cyber security education -
Emerging topics in defending networked systems
Elsevier | 2021|Schlagwörter: Network security, Information security -
An online power system static security assessment module using multi-layer perceptron and radial basis function network
Elsevier | 2015|Schlagwörter: Power system security, Security assessment
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.