Erscheinungsjahr
Medientyp
Fach
Format
Lizenz
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archiv | 2013|Schlagwörter: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Limits of Provable Security for Homomorphic Encryption
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archiv | 2013|Schlagwörter: passive Sicherheit, aktive Sicherheit -
On the Feasibility of Extending Oblivious Transfer
Tema Archiv | 2013|Schlagwörter: Sicherheit, statische Sicherheit -
Provably Secure Higher-Order Masking of AES
Tema Archiv | 2011|Schlagwörter: physikalische Security, Sicherheit, beweisbare Sicherheit -
Gravity Compensation Using Low-Cost Automation for Robot Control
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Vibration Effects of the Fixed-Wing Aircraft of the Army Aviation from Ecuador on the Human Body
TIBKAT | 2020|Schlagwörter: National security, Computer security -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
The Competitive Advantage of Additive Manufacturing in the Naval Secror
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Military Training Mission in Iraq: An Exploratory Case Study Research
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Situational Awareness of Leadership in Ecuador and Its Applicability in the Multilevel Military Leadership Model
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Online Platform to Teach Aviation English at a Military School in Salinas
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Schlagwörter: National security, Computer security -
University-Industry Collaboration Barriers: Project Management Solutions for Defense R&D—A Case Study
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Strategies and Organizational Changes for the Logistics Sustainability of Military Aircraft: Towards the Digital Transformation of In-Service Support
TIBKAT | 2020|Schlagwörter: National security, Computer security -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Kinect and Manipulator-Based Sample Collection System for Military Robot
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Geopolitical Perspective on the Sea: Key Highlights from the Past and for the Future
TIBKAT | 2020|Schlagwörter: National security, Computer security -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
The Armed Forces as a Immediate Response State Institution and Its Participation as an Articulator in the Risk Management in Ecuador
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Ocean Policy of the UNCLOS in Ecuador Based on New Geodynamic and Geochronological Evidences
TIBKAT | 2020|Schlagwörter: National security, Computer security -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Authenticated Encryption: How Reordering Can Impact Performance
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Water security in the Canadian Prairies: science and management challenges
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Detection of Algebraic Manipulation in the Presence of Leakage
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
New Lower Bounds for Privacy in Communication Protocols
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
A cost-effectiveness analysis of water security and water quality: impacts of climate and land-use change on the River Thames system
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
On (k, n) Visual Cryptography Scheme with t Essential Parties
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Leakage Resilience of the Blom's Key Distribution Scheme
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Modulus Computational Entropy
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
How to Construct Strongly Secure Network Coding Scheme
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Secure Two-Party Computation: A Visual Way
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Insider-Proof Encryption with Applications for Quantum Key Distribution
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Broadcast (and Round) Efficient Verifiable Secret Sharing
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Superposition Attacks on Cryptographic Protocols
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Growing water scarcity in agriculture: future challenge to global water security
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
The role of technology in achieving water security
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Is water security necessary? An empirical analysis of the effects of climate hazards on national-level economic growth
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Managing hydroclimatic risks in federal rivers: a diagnostic assessment
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.