Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
``Comply or Die'' Is Dead: Long Live Security-Aware Principal Agents
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
``IT'' Infrastructure Protection From Malicious Codes and Malware Protection System using Controlled Environment
British Library Conference Proceedings | 2012|Keywords: Information security -
``Trusted'' Computing Technologies Opportunities and Problems
British Library Conference Proceedings | 2006|Keywords: Computer security -
`Virtual' Security Teaching Techniques - Teaching IA methods using VMWare Teams
British Library Conference Proceedings | 2007|Keywords: Computer security -
$$\lambda _{d}$$ -Statistical Convergence, $$\lambda _{d}$$ -statistical Boundedness and Strong $$\left( V,\lambda \right) _{d}-$$ summability in Metric Spaces
Springer Verlag | 2017|Keywords: Security -
$$\mathcal {I}_\lambda $$ -double Statistically Convergent Sequences in Topological Groups
Springer Verlag | 2017|Keywords: Security -
$$\mathsf {CENCPP}^*$$: beyond-birthday-secure encryption from public permutations
Online Contents | 2022|Keywords: Provable security -
$${\varvec{1/p}}$$-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds
Online Contents | 2020|Keywords: 1/p-Security -
1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
1 Classical Polyalphabetic Substitution Ciphers
Springer Verlag | 2004|Keywords: Semantic Security -
1-in-100 years standard is a gamble, or time to go Dutch on flood planning
Taylor & Francis Verlag | 2011|Keywords: flood safety standards -
1-out-of-n Signatures from a Variety of Keys
British Library Conference Proceedings | 2002|Keywords: information security -
1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds
Springer Verlag | 2020|Keywords: 1/p-Security -
2-Compromise Usability in 1-Dimensional Statistical Databases
Springer Verlag | 2002|Keywords: statistical database security -
2D and 3D palmprint information, PCA and HMM for an improved person recognition performance
IOS Press | 2013|Keywords: security systems -
2D deterministic radiation transport with the discontinuous finite element method
NTIS | 1993|Keywords: Radiation Shielding, Protection, & Safety -
2DF; Two-Dimensional, Multigroup Discrete Ordinate Code
NTIS | 1984|Keywords: Radiation Shielding, Protection, & Safety -
2 Europa-kolloquium im Alten Reichstag
British Library Conference Proceedings | 1992|Keywords: soziale sicherheit -
2nd Workshop of Human-Automation Interaction Considerations for UAS Integration
NTIS | 2018|Keywords: Transportation Safety, Aircraft safety -
2nd Workshop of Human-Automation Interaction Considerations for UAS Integration
NTRS | 2018|Keywords: Air Transportation And Safety -
2-Player Game With Uncertainty to Protect Mission Critical Information Over Blue Networks
NTIS | 2009|Keywords: Information security -
2-Valued and 3-Valued Abstraction-Refinement in Model Checking
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
3,520 Medication Errors Evaluated to Assess the Potential for IT-Based Decision Support
British Library Conference Proceedings | 2011|Keywords: Patient safety informatics -
3D computational ghost imaging (Invited Paper) [8899-1]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
3D watermarking design evaluation [5020-35]
British Library Conference Proceedings | 2003|Keywords: security -
3. Jahrestagung des Arbeitskreises Südasien in der Deutschen Gesellschaft für 96 Geographie, Heidelberg, 25.-26. Januar 2013
Online Contents | 2013|Keywords: Internationale Sicherheit -
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
British Library Conference Proceedings | 2012|Keywords: Computer security, Information security -
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
3-Message Zero Knowledge Against Human Ignorance
Springer Verlag | 2016|Keywords: Systems and Data Security -
3-Rainbow Domination Number in Graphs
Springer Verlag | 2013|Keywords: Quality Control, Reliability, Safety and Risk -
3. Social security for urban informal workers: the case of Hyderabad, India
Taylor & Francis Verlag | 2023|Keywords: social security -
4, 8, 32, 64 Bit Substitution Box Generation Using Irreducible or Reducible Polynomials Over Galois Field GF(Pq) for Smart Applications
Springer Verlag | 2018|Keywords: Security -
4. Jahrestagung des Arbeitskreises Südasien in der Deutschen Gesellschaft für Geographie (DGfG), Freiburg, 24.-25. Januar 2014
Online Contents | 2014|Keywords: Internationale Sicherheit -
4. Kooperationsworkshop: Osttimor 10 Jahre in der Unabhängigkeit, Berlin, 16.-18. November 2012
Online Contents | 2013|Keywords: Internationale Sicherheit -
4th International Symposium on Agricultural Modernization and 8th European Conference on Agriculture and Rural Development (ECARD) in China: Yiwu, VR China, 31.8.-2.9.2006
Online Contents | 2006|Keywords: Internationale Sicherheit -
5. DGA-Nachwuchstagung: "Asien in Bewegung: Politischer, kultureller und gesellschaftlicher Wandel einer Weltregion", Evangelische Akademie Arnoldshain, 29. April - 1. Mai 2011
Online Contents | 2011|Keywords: Internationale Sicherheit -
5th International Conference on Critical Infrastructure (CRIS), 2010 : 20 - 22 Sept. 2010, Beijing, China ; proceedings
TIBKAT | 2010|Keywords: Computer security -
5th International Malaysian Studies Conference (MSC 5): Serdang, Malaysia, 8.-10. August 2006
Online Contents | 2006|Keywords: Internationale Sicherheit -
5th International Seminar on Vernacular Settlements, Colombo, Sri Lanka, 30.-31. Juli 2010
Online Contents | 2012|Keywords: Internationale Sicherheit -
5. Vsesoyuznaya nauchnaya konferentsiya po zashchite ot ioniziruyushchikh izluchenij yaderno-tekhnicheskikh ustanovok. (5th All-Union scientific conference on ionizing radiation protection of nuclear-technical installations)
NTIS | 1990|Keywords: Radiation Shielding, Protection, & Safety -
6.033 Computer System Engineering (SMA 5501), Spring 2005.
Computer System Engineering (SMA 5501)Free accessDSpace@MIT | 2005|Keywords: security -
6.824 Distributed Computer Systems, Fall 2002.
Distributed Computer SystemsFree accessDSpace@MIT | 2002|Keywords: security -
6.857 Network and Computer Security, Fall 2003.
Network and Computer SecurityFree accessDSpace@MIT | 2003|Keywords: electronic mail security, security, email security, computer security, network security, physical security -
6. DGA-Nachwuchstagung, Thüringer Sozialakademie Jena, 18.-20. Januar 2013
Online Contents | 2013|Keywords: Internationale Sicherheit -
6th Asia-Europe Young Leaders Symposium: Berlin, 23.-28. Juni 2002
Online Contents | 2003|Keywords: Internationale Sicherheit -
6 The Social Costs of Resilience: An Example from the Faroe Islands
Wiley | 2016|Keywords: human security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.