Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
VoIP FMS: a comprehensive Voice over IP Fraud Management System : user/developer guide
Free accessTIBKAT | 2013|Keywords: Sicherheit -
Recent Advances in Cryptography and Network Security
Free accessGWLB - Gottfried Wilhelm Leibniz Bibliothek | 2018|Keywords: Computer security -
Research of Security Schemes for Mobile IP
National licenceTrans Tech Publications | 2014|Keywords: Security Threats, Security Schemes -
Internet of Things and Wireless Physical Layer Security: A Survey
Springer Verlag | 2017|Keywords: Physical layer security (PLS), Wireless security techniques, Security attacks and challenges, Systems and Data Security -
Complexity and Cybercomplexity
Springer Verlag | 2022|Keywords: Security, Security Science and Technology, Crime Control and Security -
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments
Free accessOnline Contents | 2021|Keywords: Transport Layer Security (TLS), Provable security -
Security is an architectural design constraint
Elsevier | 2019|Keywords: Security-efficiency trade-off, Security-aware design -
Disposable configuration of remotely reconfigurable systems
Elsevier | 2015|Keywords: FPGA security, Configuration security -
Designing Safe Electrolyte Systems for a High‐Stability Lithium–Sulfur Battery
Wiley | 2018|Keywords: safety -
Measuring ROI in a Job Safety Training Program at a Major Food Retailer
Wiley | 2014|Keywords: safety, job safety, safety training -
Network Security
TIBKAT | 2014|Keywords: COMPUTERS ; Internet ; Security, COMPUTERS ; Networking ; Security, Internet ; Security measures, Computer networks ; Security measures -
Real-time data reassurance in electrical power systems based on artificial neural networks
Elsevier | 2012|Keywords: Power system security, Cyber security -
E-Commerce Information Management System Data Security Research
National licenceTrans Tech Publications | 2014|Keywords: Network Security, Security Technology -
Everlasting Multi-party Computation
Tema Archive | 2013|Keywords: Sicherheit, immerwährende Sicherheit -
Improving functionality, efficiency, and trustworthiness of secure communication on an internet diversified by mobile devices and the internet of things
DataCite | 2023|Keywords: communication security ; security and privacy ; IoT ; TLS ; Tor ; PKI -
Terahertz imaging system for stand-off detection of threats
Tema Archive | 2007|Keywords: Sicherheit, nationale Sicherheit -
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)
Springer Verlag | 2018|Keywords: Cyber security, Systems and Data Security, Security -
An experimental study of attacks on the availability of Glossy
Elsevier | 2014|Keywords: Security attacks, Network security -
Fazit
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Security Services -
A formal model for proving hardware timing properties and identifying timing channels
Elsevier | 2020|Keywords: Hardware security, Security vulnerability -
Securing IoTs in distributed blockchain: Analysis, requirements and open issues
Elsevier | 2019|Keywords: Blockchain security -
Have our backs‐medical‐surgical nurses’ safety culture experiences: An inductive qualitative descriptive study
Free accessWiley | 2024|Keywords: patient safety, safety culture -
On the features and challenges of security and privacy in distributed internet of things
Elsevier | 2013|Keywords: Security -
Denial of service attack detection through machine learning for the IoT
Free accessDOAJ | 2020|Keywords: security, network security -
Darstellung der Informationssicherheit und des Datenschutzes
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Security Services -
The Application of Dispatch Operation Ticket System Based on Intelligent Anti-Misoperation Method
Tema Archive | 2013|Keywords: elektrische Sicherheit, Sicherheit -
Securing electronics healthcare records in Healthcare 4.0 : A biometric-based approach
Elsevier | 2019|Keywords: Security -
VoIP FMS: a comprehensive Voice over IP Fraud Management System : user/developer guide
TIBKAT | 2013|Keywords: Sicherheit -
A secure dynamic collaboration environment in a cloud context
Elsevier | 2015|Keywords: Security, Information security -
A novel abstraction for security configuration in virtual networks
Elsevier | 2023|Keywords: Automatic network security, Security function selection -
HTTP header based phishing attack detection using machine learning
Wiley | 2024|Keywords: Cyber Security, Security and Privacy -
Security Operations Center: A Systematic Study and Open Challenges
Free accessDOAJ | 2020|Keywords: Security management, security operations center, security operations -
Zusammenfassung
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Security Services -
Prüfung der Übertragbarkeit des Prozesses ZAWAS auf die Informationssicherheit
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Security Services -
Der Prozess zur Auswahl angemessener Sicherungsmaßnahmen (ZAWAS)
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Security Services -
A framework for enhancing mobile workflow execution through injection of flexible security controls
Online Contents | 2018|Keywords: Security injection, Security controls, Security modeling -
System-Level Diagnoses of Safety, Security and Reliability in Automotive Electrical/Electronic (E/E) Architectures
TIBKAT | 2017|Keywords: Technische Sicherheit -
General Congestion Attack on HTLC-Based Payment Channel Networks
Free accessDataCite | 2022|Keywords: Security and privacy → Distributed systems security -
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Passive Corruption in Statistical Multi-Party Computation (Extended Abstract)
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
On the Complexity of Anonymous Communication Through Public Networks
Free accessDataCite | 2021|Keywords: Security and privacy → Security protocols -
Ausgangslage: Anforderung der Digitalisierung
Springer Verlag | 2021|Keywords: Systems and Data Security, Principles and Models of Security, Security Services -
Secure Data Transmission Through Reliable Vehicles in VANET Using Optimal Lightweight Cryptography
Springer Verlag | 2019|Keywords: Security, Systems and Data Security, Security Science and Technology -
Security Features in Mobile Communications Networks
Wiley | 2021|Keywords: security algorithms, security context, security interworking -
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.