Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
151–200 of 9,791 hits
Sort by:
Sort by:
-
A composable framework for secure multi-modal access to Internet services from post-PC devices
Tema Archive | 2000|Keywords: Sicherheit -
A Comprehensive Agent-Based Safety Solution Meeting the Controllable Work System
Tema Archive | 2011|Keywords: mobile Sicherheit -
A comprehensive simulation tool for the analysis of password policies
Online Contents | 2009|Keywords: Sicherheit -
A comprehensive study of queue management as a DoS counter-measure
Online Contents | 2013|Keywords: Sicherheit -
A Comprehensive Study on Two-factor Authentication with One Time Passwords
Tema Archive | 2013|Keywords: Sicherheit -
A computer architecture with hardwarebased malware detection
Tema Archive | 2010|Keywords: Sicherheit -
A computer package for optimal multi-objective VAR planning in large scale power systems
Tema Archive | 1993|Keywords: Sicherheit -
A concept for on-line testing of distributed safety-critical supervisory systems
Tema Archive | 2003|Keywords: Sicherheit -
A configurable cryptography subsystem in a middleware framework for embedded systems
Tema Archive | 2004|Keywords: Sicherheit -
A Consumption Authenticator Based Mechanism for Time-of-Use Smart Meter Measurements Verification
Tema Archive | 2012|Keywords: Sicherheit -
A Content and Peer Reputation Method for Suppressing Harmful Content in Relay-Transfer P2P File Sharing
Tema Archive | 2010|Keywords: Sicherheit -
A context-aware robust intrusion detection system: a reinforcement learning-based approach
Online Contents | 2019|Keywords: Sicherheit -
A context-centered methodology for IoT forensic investigations
Online Contents | 2020|Keywords: Sicherheit -
A control and management system for the C and C satellite office
Tema Archive | 1986|Keywords: SICHERHEIT -
A CORBA based framework for trusted E-commerce transactions
Tema Archive | 1999|Keywords: Sicherheit -
A criteria-based evaluation framework for authentication schemes in IMS
Tema Archive | 2009|Keywords: Sicherheit -
A criterion-based role-based multilayer access control model for multimedia applications
Tema Archive | 2006|Keywords: Sicherheit -
A Cross-Layer Security Scheme of Web-Services-Based Communications for IEEE 1451 Sensor and Actuator Networks
Tema Archive | 2013|Keywords: Web-Sicherheit -
A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network
Online Contents | 2012|Keywords: Sicherheit -
A Cryptographic Solution to Privacy-Preserving Two-Party Sign Test Computation on Vertically Partitioned Data
Tema Archive | 2011|Keywords: Sicherheit -
Active authentication for mobile devices utilising behaviour profiling
Online Contents | 2013|Keywords: Sicherheit -
Active camera control with obstacle avoidance for remote operations with industrial manipulators: Implementation and experimental results
Tema Archive | 2011|Keywords: Sicherheit -
Active Defense Against Social Engineering: The Case for Human Language Technology
TIBKAT | 2020|Keywords: Social Engineering (Sicherheit) -
Active Defense Security Model in the Application of Network Deception System Design
Tema Archive | 2013|Keywords: aktive Sicherheit -
ACtive edge-Tagging (ACT): an intruder identification and isolation scheme in active networks
Tema Archive | 2001|Keywords: Sicherheit -
Active learning for on-road vehicle detection: a comparative study
Tema Archive | 2014|Keywords: aktive Sicherheit -
Active Security in Multiparty Computation over Black-Box Groups
Tema Archive | 2012|Keywords: aktive Sicherheit -
Actuation sensor with adaptive routing and QOS aware checkpoint arrangement on Wireless Multimedia Sensor Network
Tema Archive | 2011|Keywords: Sicherheit -
Adaptation of a Lexical Organization for Social Engineering Detection and Response Generation
TIBKAT | 2020|Keywords: Social Engineering (Sicherheit) -
Adapting the pretty good privacy security style to power system distributed network protocol
Tema Archive | 2006|Keywords: Sicherheit -
Adaption des Szenarios einer WiFi-Wurm-Epidemie auf den Automotive-Bereich zur Sensibilisierung und Aufklärung
Tema Archive | 2009|Keywords: VoIP-Sicherheit -
Adaption und Anwendung des COBIT 5 Process Assessment Model in der öffentlichen Verwaltung
Tema Archive | 2014|Keywords: IT-Sicherheit -
Adaptive approach to safety control and security system modification in computer systems and networks
Tema Archive | 2009|Keywords: Sicherheit -
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
Online Contents | 2013|Keywords: Sicherheit -
Adaptive early packet filtering for defending firewalls against DoS attacks
Tema Archive | 2009|Keywords: Sicherheit -
Adaptive Location Division Multiple Access for reliable safety message dissemination in VANETs
Tema Archive | 2009|Keywords: Sicherheit -
Adaptive lossy error protection architecture in H.264 video transmission
Tema Archive | 2009|Keywords: Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.