Erscheinungsjahr
Medientyp
Fach
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Bounded-Deducibility Security (Invited Paper)
Freier ZugriffDataCite | 2021|Schlagwörter: Security and privacy → Security requirements, Information-flow security, Security and privacy → Formal security models, Security and privacy → Logic and verification -
Cyberspace and Innocent Passage: Regulations for the Security of the Coastal State
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Data Mining and Association Rules to Determine Twitter Trends
TIBKAT | 2020|Schlagwörter: National security, Computer security -
3D computational ghost imaging (Invited Paper) [8899-1]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Determination of Optimal Procedures for Maintenance and Repair Operations of the GDU-620 Garmin Applied to the DA20C-1 Aircraft
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Monte Carlo-Based Localization for Kidnapped Robot Problem
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Ackermann UGV with 2D Mapping for Unknown Environments
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Expert Nutritional System for Military Athletes Based on Fuzzy Logic and Inferential Statistics
TIBKAT | 2020|Schlagwörter: National security, Computer security -
Towards a high-speed quantum random number generator [8899-29]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Truly random number generation: an example [8899-30]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Essential elements lacking in security proofs for quantum key distribution (Invited Paper) [8899-21]
British Library Conference Proceedings | 2013|Schlagwörter: Quantum security, Security, Information security -
Managing security work in scrum: Tensions and challenges
Freier ZugriffFraunhofer Publica | 2017|Schlagwörter: security work, software security, security requirements -
Resilience Engineering's Potential for Advanced Air Mobility (AAM)
NTRS | 2021|Schlagwörter: Safety-II, Air Transportation And Safety, Aviation Safety -
Water security in the Canadian Prairies: science and management challenges
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
A cost-effectiveness analysis of water security and water quality: impacts of climate and land-use change on the River Thames system
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
A review of the literature on patient participation in transitions of the elderly
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
Standardisation and its discontents
British Library Conference Proceedings | 2015|Schlagwörter: Patient safety, Healthcare safety -
The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
The role of technology in achieving water security
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
The governance dimensions of water security: a review
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Water security, global change and land-atmosphere feedbacks
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Extreme rainfall, vulnerability and risk: a continental-scale assessment for South America
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Is water security necessary? An empirical analysis of the effects of climate hazards on national-level economic growth
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Managing hydroclimatic risks in federal rivers: a diagnostic assessment
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Risk-based principles for defining and managing water security
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Risks and responses to universal drinking water security
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Growing water scarcity in agriculture: future challenge to global water security
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Domestic water and sanitation as water security: monitoring, concepts and strategy
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Catalysing sustainable water security: role of science, innovation and partnerships
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Water security in one blue planet: twenty-first century policy challenges for science
British Library Conference Proceedings | 2013|Schlagwörter: Water security, Security -
Square Span Programs with Applications to Succinct NIZK Arguments
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Meet-in-the-Middle Attacks on Generic Feistel Constructions
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
A Simplified Representation of AES
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Beyond 2^c^/^2 Security in Sponge-Based Authenticated Encryption Modes
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
An Increasing Need for Formality (Invited Talk)
Freier ZugriffDataCite | 2019|Schlagwörter: Security and privacy → Formal methods and theory of security, Security and privacy → Security in hardware, Hardware security -
Actively Secure Private Function Evaluation
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Multi-valued Byzantine Broadcast: The t < n Case
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Higher-Order Threshold Implementations
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
How to Securely Release Unverified Plaintext in Authenticated Encryption
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Side-Channel Analysis of Multiplications in GF(2^1^2^8): Application to AES-GCM
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Simulatable Leakage: Analysis, Pitfalls, and New Constructions
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Bootstrapping Obfuscators via Fast Pseudorandom Functions
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Adaptive Security of Constrained PRFs
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
On Tight Security Proofs for Schnorr Signatures
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security -
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
British Library Conference Proceedings | 2014|Schlagwörter: Computer security, Information security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.