Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk)
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Interactive VoiceXML Module into SIP-Based Warning Distribution System
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Susceptible Two-Party Quantum Computations
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Efficient Traitor Tracing from Collusion Secure Codes
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
A Proof of Security in O(2^n) for the Xor of Two Random Permutations
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Key Refreshing in Wireless Sensor Networks
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Oblivious Transfer Based on the McEliece Assumptions
British Library Conference Proceedings | 2008|Keywords: Database security., Computer security., Theoretic security -
Waters Signatures with Optimal Security Reduction
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
Cybersecurity: Of Heterogeneity and Autarky
British Library Conference Proceedings | 2005|Keywords: Cyber security, Computer security., Computer security -
Secure IT systems : 28th Nordic conference, NordSec 2023, Oslo, Norway, November 16-17, 2023 : proceedings
TIBKAT | 2024|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Cardiac Safety Research Consortium; Rechanneling the cardiac proarrhythmia safety paradigm
British Library Conference Proceedings | 2014|Keywords: Proarrhythmia safety, Cardiac safety -
Sociotechnical attributes of safe and unsafe work systems
Online Contents | 2015|Keywords: safety climate, occupational safety, Occupational safety -
Cryptanalysis of Secure Message Transmission Protocols with Feedback
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Security Region Based Dynamic Security Risk Assessment of Power Transmission System
Tema Archive | 2012|Keywords: security region, dynamic security -
A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Group Testing and Batch Verification
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Construction safety personnel's perceptions of safety training practices
Online Contents | 2015|Keywords: Construction accidents & safety, Safety management, Safety training -
Multiterminal Secrecy Generation and Tree Packing
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Linear Threshold Multisecret Sharing Schemes
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Enhancing Security in Medical Image Communication with JPEG2000 Compression and Lossless Watermarking
Tema Archive | 2013|Keywords: medizinische Sicherheit, Sicherheit -
Survey: Leakage Resilience and the Bounded Retrieval Model
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Router Attack toward NoC-enabled MPSoC and Monitoring Countermeasures against such Threat
Online Contents | 2015|Keywords: Hardware security, Multiprocessor System-on-Chip security, Network-on-Chip security -
The Optimum Leakage Principle for Analyzing Multi-threaded Programs
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Information Theoretic Security Based on Bounded Observability
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
On the Optimization of Bipartite Secret Sharing Schemes
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Security of Key Distribution and Complementarity in Quantum Mechanics
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Statistical-Mechanical Approach for Multiple Watermarks Using Spectrum Spreading
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Provable Second Preimage Resistance Revisited
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems
Online Contents | 2018|Keywords: security monitoring, security metrics -
Cyber situational awareness through network anomaly detection: state of the art and new approaches
Tema Archive | 2015|Keywords: IT-Sicherheit, Sicherheit, nationale Sicherheit -
Abschlussbericht - ASMONIA : Berichtszeitraum: September 2010 - Mai 2013
TIBKAT | 2013|Keywords: Sicherheit -
Cybersecurity Best Practices Now Being Developed for Lighting Networks
Online Contents | 2017Keywords: Safety and security measures, Security software -
A Golden Age of Security and Education? Adult Education for Civil Defence in the United States 1950-1970
Online Contents | 2015|Keywords: National security, security -
Code-Based Public-Key Cryptosystems and Their Applications
British Library Conference Proceedings | 2010|Keywords: Database security, Computer security -
Selling safety: the use of celebrities in improving awareness of safety in commercial aviation
Online Contents | 2016|Keywords: Aircraft accidents & safety, Safety briefing, cabin safety
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.