Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
New Results on Unconditionally Secure Multi-receiver Manual Authentication
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Introduction to Quantum Information Theory
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Strongly Multiplicative Hierarchical Threshold Secret Sharing
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
A Survey of Network Attacks Based on Protocol Vulnerabilities
British Library Conference Proceedings | 2014|Schlagwörter: Information security, Network security -
Physical layer security schemes for MIMO systems: an overview
Online Contents | 2019|Schlagwörter: Security services, Security -
Digital Fingerprinting under and (Somewhat) beyond the Marking Assumption (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
The Round Complexity of Perfectly Secure General VSS
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Bell Inequalities: What Do We Know about Them and Why Should Cryptographers Care? (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Correlation Extractors and Their Applications (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model
Tema Archiv | 2013|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Using Colors to Improve Visual Cryptography for Black and White Images
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
On Information Theoretic Security: Mathematical Models and Techniques (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
On the Security of TLS-DHE in the Standard Model
Tema Archiv | 2012|Schlagwörter: Internet-Sicherheit -
Abschlussbericht - ASMONIA : Berichtszeitraum: September 2010 - Mai 2013
TIBKAT | 2013|Schlagwörter: Sicherheit -
Graceful Degradation in Multi-Party Computation
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Efficient Reductions for Non-signaling Cryptographic Primitives
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Quantum Communication Attacks on Classical Cryptographic Protocols (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Some Notions of Entropy for Cryptography (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Unconditionally Secure Signature Schemes Revisited
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
LT-Codes and Phase Transitions for Mutual Information (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Video-assisted surgery: suggestions for failure prevention in laparoscopic cholecystectomy
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Perspectives on healthcare safety and quality: selected papers from the 2nd Nordic Conference on Research in Patient Safety and Quality in Healthcare
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
(S)he shall not be moved: Gender, bodies and travel rights in the post-9/11 era
Online Contents | 2015|Schlagwörter: National security, Security management, Airline security, Security personnel -
Randomly Encoding Functions: A New Cryptographic Paradigm (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Danish cancer patients' perspective on health care: results from a national survey
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Theory of Quantum Key Distribution: The Road Ahead (Invited Talk)
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
A Single Initialization Server for Multi-party Cryptography
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Interactive Hashing: An Information Theoretic Tool (Invited Talk)
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Simple Direct Reduction of String (1,2)-OT to Rabin's OT without Privacy Amplification
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
List Error-Correction with Optimal Information Rate (Invited Talk)
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Statistical Security Conditions for Two-Party Secure Function Evaluation
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Povyšenie nadežnosti i ėnergoėffektivnosti ėlektrotechničeskich sistem i kompleksov : mežvuzovskij sbornik naučnych trudov ; 19 - 20 sentjabrja 2010 g.
TIBKAT | 2010|Schlagwörter: Sicherheit -
Provable Second Preimage Resistance Revisited
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
HASSLE-FREE STEPS TOWARD INCREASED DATA SECURITY
Online Contents | 2015|Schlagwörter: Data security, Computer security, Network security -
A Proof of Security in O(2^n) for the Xor of Two Random Permutations
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Efficient Traitor Tracing from Collusion Secure Codes
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Transmitting safety-related information to cyclists - Influence of modality on perception and efficient response
TIBKAT | 2021|Schlagwörter: Sicherheit -
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grostl, JH, Keccak, and Skein
Tema Archiv | 2012|Schlagwörter: Sicherheit, beweisbare Sicherheit -
The Complexity of Distinguishing Distributions (Invited Talk)
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security -
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
British Library Conference Proceedings | 2008|Schlagwörter: Database security., Computer security., Theoretic security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.