1–50 von 27.442 Ergebnissen

Sortieren nach: Relevanz | Aktualität neu zuerst | Titel A-Z

Treffer filtern

Externe Quellen

Suchen...

Synonyme wurden verwendet für: Datensicherheit

Suche ohne Synonyme: keywords:(Datensicherheit)

Verwendete Synonyme:

  • data integrity
  • data security
  • datenintegritat
  • datensicherung
  • security of data
  1.  

    An efficient data integrity auditing protocol for cloud computing

    Garg, Neenu / Bawa, Seema / Kumar, Neeraj | Elsevier | 2020
    Schlagwörter: Data integrity, Data integrity auditing
  2.  

    Comparative analysis of cloud data integrity auditing protocols

    Garg, Neenu / Bawa, Seema | Elsevier | 2016
    Schlagwörter: Data integrity, Data integrity auditing
  3.  

    Critical survey of existing publicly verifiable secret sharing schemes

    Peng, K. | IET | 2012
    Schlagwörter: security of data
  4.  

    For your eyes only?

    Mileham, R. | IET | 2012
    Schlagwörter: security of data
  5.  

    Effective metric for detecting distributed denial-of-service attacks based on information divergence

    Li, K. / Zhou, W. / Yu, S. | IET | 2009
    Schlagwörter: security of data
  6.  

    The terrors and the errors [cyber-terrorist attack]

    Hayes, J. | IET | 2010
    Schlagwörter: security of data
  7.  

    Unconditionally secure social secret sharing scheme

    Nojoumian, M. / Stinson, D.R. / Grainger, M. | IET | 2010
    Schlagwörter: security of data
  8.  

    The shadownet [World Wide Web]

    Vitaliev, D. | IET | 2010
    Schlagwörter: security of data
  9.  

    Improving the Common Vulnerability Scoring System

    Mell, P. / Scarfone, K. | IET | 2007
    Schlagwörter: security of data
  10.  

    Industrial systems: cyber-security's new battlefront

    Piggin, R. | IET | 2014
    Schlagwörter: security of data
  11.  

    e-doctor's tips

    Vitaliev, D. | IET | 2008
    Schlagwörter: security of data
  12.  

    Mash-up maps [management map data]

    Clapperton, G. | IET | 2010
    Schlagwörter: security of data
  13.  

    The State vs. the People

    Guarino, A. | IET | 2013
    Schlagwörter: security of data
  14.  

    Reassuringly expensive

    Edwards, C. | IET | 2010
    Schlagwörter: security of data
  15.  

    Fragile Web [Internet security]

    Sandham, D. | IET | 2008
    Schlagwörter: security of data
  16.  

    Anonymity and security for autonomous mobile agents

    Raji, F. / Tork Ladani, B. | IET | 2010
    Schlagwörter: security of data
  17.  

    Agent-based honeynet framework for protecting servers in campus networks

    Kim, I.S. / Kim, M.H. | IET | 2012
    Schlagwörter: security of data
  18.  

    Life begins at 45 [mainframe software]

    Eddolls, T. | IET | 2009
    Schlagwörter: security of data
  19.  

    Safe as houses [home security]

    Harris, M. | IET | 2010
    Schlagwörter: security of data
  20.  

    Analysis and improvement of a fair remote retrieval protocol for private medical records

    Deng, Jiang / Xu, Chunxiang / Wu, Huai et al. | Wiley | 2016
    Schlagwörter: data integrity
  21.  

    Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack

    Yuechuan Wei / Yisheng Rong / Xu An Wang | Online Contents | 2016
    Schlagwörter: Data integrity
  22.  

    Refinements of the ALRED construction and MAC security claims

    Daemen, J. / Rijmen, V. | IET | 2010
    Schlagwörter: security of data
  23.  

    Wide band spectroscopic skin detection for contactless hand biometrics

    Ferrer, M.A. / Morales, A. / Travieso, C.M. et al. | IET | 2012
    Schlagwörter: security of data
  24.  

    RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks

    Wang, Huaqun / He, Debiao / Yu, Jia et al. | Elsevier | 2021
    Schlagwörter: Data integrity checking
  25.  

    Have data? Will travel [IT security threat]

    Hayes, J. | IET | 2008
    Schlagwörter: security of data
  26.  

    A farewell to hanging chads [electronic voting]

    Harris, M. | IET | 2010
    Schlagwörter: security of data
  27.  

    Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions

    Note, Margot | Emerald Group Publishing | 2009
    Schlagwörter: Security of data
  28.  

    Empirical support for the generation of domain-oriented quality models

    Villalba, M.T. / Ferna´ndez-Sanz, L. / Marti´nez, J.J. | IET | 2010
    Schlagwörter: security of data
  29.  

    Separation of Short Time Series of Currents into ''Fluctuations,'' ''Tides,'' and ''Mean'' Flow

    Ann E Gargett / Dana K Savidge | Online Contents | 2016
    Schlagwörter: Data integrity
  30.  

    Quantification of private information leakage from phenotype-genotype data: linking attacks

    Arif Harmanci / Mark Gerstein | Online Contents | 2016
    Schlagwörter: Data integrity
  31.  

    Open source = open invitation?

    Courtney, M. | IET | 2009
    Schlagwörter: security of data
  32.  

    Proactive service migration for long-running Byzantine fault-tolerant systems

    Zhao, W. / Zhang, H. | IET | 2009
    Schlagwörter: security of data
  33.  

    Security evaluation of biometric authentication systems under real spoofing attacks

    Biggio, B. / Akhtar, Z. / Fumera, G. et al. | IET | 2012
    Schlagwörter: security of data
  34.  

    Lossy data aggregation integrity scheme in wireless sensor networks

    Niu, Shufen / Wang, Caifen / Yu, Zhixuan et al. | Tema Archiv | 2013
    Schlagwörter: Datenintegrität
  35.  

    Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited

    Ji, Yanyan / Shao, Bilin / Chang, Jinyong et al. | Elsevier | 2020
    Schlagwörter: Data integrity
  36.  

    Multiple‐replica integrity auditing schemes for cloud data storage

    Lin, Yangfei / Li, Jie / Jia, Xiaohua et al. | Wiley | 2021
    Schlagwörter: data integrity
  37.  

    Formal specification scheme for database applications using requirements particle networks

    Vatanawood, Wiwat / Rivepiboon, Wanchai | Emerald Group Publishing | 2002
    Schlagwörter: Data integrity
  38.  

    Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

    Zhao, Quanyu / Chen, Siyi / Liu, Zheli et al. | Elsevier | 2020
    Schlagwörter: Data integrity checking
  39.  

    Approach to security assessment of critical infrastructures’ information systems

    Leszczyna, R. / Fovino, I.N. / Masera, M. | IET | 2011
    Schlagwörter: security of data
  40.  

    Who owns your personal data?

    Sangani, K. | IET | 2010
    Schlagwörter: security of data
  41.  

    Data Integrity and Availability in Cloud Computing Based on Megastore

    Nationallizenz
    Yu, Yue Yue / Qin, Su Quan / Wen, Qiao Yan | Trans Tech Publications | 2013
    Schlagwörter: Data Integrity
  42.  

    The IT security game

    Edwards, C. | IET | 2009
    Schlagwörter: security of data
  43.  

    Recovery of flash memories for reliable mobile storages

    IOS Press | 2010
    Schlagwörter: data integrity
  44.  

    Integrity as a service for replicated data on the cloud

    Abo‐alian, Alshaimaa / Badr, Nagwa L. / Tolba, M. F. | Wiley | 2017
    Schlagwörter: data integrity
  45.  

    Reversible watermarking resistant to cropping attack

    Weng, S.W. / Zhao, Y. / Pan, J.-S. | IET | 2007
    Schlagwörter: security of data
  46.  

    Advanced traveller information systems for intelligent future mobility: the case of ‘AnachB’ in Vienna

    Go¨tzenbrucker, G. / Ko¨hl, M. | IET | 2012
    Schlagwörter: security of data
  47.  

    Multi-Replica Dynamic Data Verification for Cloud Computing

    Nationallizenz
    Luo, Wen Jun / Liu, Lu | Trans Tech Publications | 2012
    Schlagwörter: Data Integrity
  48.  

    Control Systems Cybersecurity: Lessons Learned From Virginia Assessments

    Christian Manalo / Tom Noble / Kyle Miller et al. | Online Contents | 2015
    Schlagwörter: Data integrity

Ergebnisse anzeigen: 10 | 20 | 50

Feedback