Erscheinungsjahr
Fach
Format
Lizenz
TIB-Lesesaalbestand
LUH-Institutsbestand
Synonyme wurden verwendet für: Sicherheit
Suche ohne Synonyme: keywords:(Sicherheit)
Verwendete Synonyme:
- safety
- security
-
Sicherheit im Eisenbahnbetrieb : 15. Wiener Eisenbahnkolloquium, 9.-10. März 2017
TIBKAT | 2017|Schlagwörter: Technische Sicherheit -
Survey on the Web Services Security Specifications
Tema Archiv | 2013|Schlagwörter: Sicherheit, Services-Sicherheit, Internet-Services-Sicherheit, WS-Security -
Security officers’ attitudes towards training and their work environment
Online Contents | 2016|Schlagwörter: Security management, Security personnel -
Broadcast (and Round) Efficient Verifiable Secret Sharing
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Superposition Attacks on Cryptographic Protocols
British Library Conference Proceedings | 2014|Schlagwörter: Database security, Computer security, Information theoretic security -
Terahertz imaging system for stand-off detection of threats
Tema Archiv | 2007|Schlagwörter: Sicherheit, nationale Sicherheit -
VoIP FMS: a comprehensive Voice over IP Fraud Management System : user/developer guide
TIBKAT | 2013|Schlagwörter: Sicherheit -
System-Level Diagnoses of Safety, Security and Reliability in Automotive Electrical/Electronic (E/E) Architectures
TIBKAT | 2017|Schlagwörter: Technische Sicherheit -
The Application of Dispatch Operation Ticket System Based on Intelligent Anti-Misoperation Method
Tema Archiv | 2013|Schlagwörter: elektrische Sicherheit, Sicherheit -
Recommended practice for general fuel cell vehicle safety
TIBKAT | 2023|Schlagwörter: Technische Sicherheit -
Entwicklung eines Security Tokens zur Sicherstellung der Systemintegrität in Selbstbedienungsautomaten : Abschlussbericht von Morpho für das Projekt SiS
TIBKAT | 2012|Schlagwörter: Sicherheit -
DNSSEC: a protocol toward securing the Internet infrastructure
Tema Archiv | 2007|Schlagwörter: Sicherheit, Internet-Sicherheit -
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
A framework for enhancing mobile workflow execution through injection of flexible security controls
Online Contents | 2018|Schlagwörter: Security injection, Security controls, Security modeling -
Construction Methodology of Unconditionally Secure Signature Schemes
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Euro Security : das deutsche Sicherheitsmagazin für Planer, Errichter und Anwender
[Deutsche Ausg.].TIBKAT | 2.1996,7 -Schlagwörter: Technische Sicherheit -
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Passive Corruption in Statistical Multi-Party Computation (Extended Abstract)
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Cryptographic Security of Individual Instances
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Improvement of Collusion Secure Convolutional Fingerprinting Information Codes
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Guessing Secrecy
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Shannon Impossibility, Revisited
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Discretion and fairness in airport security screening
Online Contents | 2015|Schlagwörter: Airline security, National security -
Two Protocols for Delegation of Computation
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Security Model and Analysis of FHMQV, Revisited
Tema Archiv | 2014|Schlagwörter: Sicherheit, beweisbare Sicherheit -
Safety signs on agricultural machinery: Pictorials do not always successfully convey their messages to target users
Online Contents | 2017|Schlagwörter: Safety and security measures, Occupational safety, Safety signs -
SECURITAS: Sicherheitsmanagement in Kommunikationsnetzen : Abschlussbericht ; Laufzeit des Vorhabens: 01.06.2008 - 31.07.2011
TIBKAT | 2012|Schlagwörter: Sicherheit -
Polyscope : das Fachmagazin für Industrieelektronik und Automation
TIBKAT | [1.]1969; 2.1970-2023, 12 (7. Dezember 2023)Schlagwörter: Technische Sicherheit -
Optimum General Threshold Secret Sharing
British Library Conference Proceedings | 2012|Schlagwörter: Database security, Computer security, Information theoretic security -
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Common Randomness and Secret Key Capacities of Two-Way Channels
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Quantum-Resilient Randomness Extraction (Invited Talk)
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security -
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Unconditionally Secure Blind Signatures
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Secret Sharing Comparison by Transformation and Rotation
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Commitment and Authentication Systems
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Random Systems: Theory and Applications
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Anonymous Quantum Communication (Extended Abstract)
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
On Exponential Lower Bound for Protocols for Reliable Communication in Networks
British Library Conference Proceedings | 2009|Schlagwörter: Database security, Computer security -
Utility-preserving differentially private data releases via individual ranking microaggregation
Online Contents | 2016|Schlagwörter: Cryptography and Security -
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
British Library Conference Proceedings | 2011|Schlagwörter: Database security, Computer security, Information Theoretic Security
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.