Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Structured magnetic media for data security
IET Digital Library Archive | 1981|Keywords: data security, security of data -
How secure is Wi-Fi today?
IET Digital Library Archive | 2006|Keywords: security controls, telecommunication security -
Improvements to internet access control security scheme
IET Digital Library Archive | 1992|Keywords: internet access control security scheme, security of data -
Hardware-software implementation of public-key cryptography for wireless sensor networks
IET Digital Library Archive | 2006|Keywords: wireless sensor networks security, telecommunication security -
New voice over Internet protocol technique with hierarchical data security protection
IET Digital Library Archive | 2002|Keywords: hierarchical data security protection, security of data, high data security -
Designing reliable wireless networks for safety critical applications
IET Digital Library Archive | 2005|Keywords: safety critical applications, network security, telecommunication security -
Electrical apparatus for flammable atmospheres
IET Digital Library Archive | 1990|Keywords: intrinsic safety, safety -
A secure mobile-IPv6 network model
IET Digital Library Archive | 2006|Keywords: IP security protocol, communication security, telecommunication security -
An efficient authentication method for H.264/AVC
IET Digital Library Archive | 2005|Keywords: security of data, security -
Computer security: mystery or science?
IET Digital Library Archive | 1992|Keywords: computer security, UK IT Security Evaluation and Certification, security of data -
The development of low voltage switch box
IET Digital Library Archive | 2006|Keywords: security stability, power system security -
Extension of authentication protocol for GSM
IET Digital Library Archive | 2003|Keywords: security algorithms, security, telecommunication security -
Protecting future mobile access networks
IET Digital Library Archive | 2004|Keywords: wireless network security, telecommunication security, network security threats -
Peer-to-peer
IET Digital Library Archive | 2004|Keywords: IP security protocol, security of data, telecommunication security -
Proactive worm prevention based on P2P networks
IET Digital Library Archive | 2006|Keywords: security issues, telecommunication security -
A practical distributed secure system
IET Digital Library Archive | 1986|Keywords: multilevel security policies, security of data, trustworthy security mechanisms -
The UK electricity market
IET Digital Library Archive | 2004|Keywords: security, power system security -
Safety control of electrical installation in Hong Kong
IET Digital Library Archive | 2004|Keywords: safety control, safety -
How to integrate new technologies and legacy systems
IET Digital Library Archive | 2005|Keywords: security risks demand, network security, power system security -
Mobile gadgets catch the dreaded lurgi
IET Digital Library Archive | 2005|Keywords: security, security of data -
User authentication with anonymit for global mobility networks
IET Digital Library Archive | 2005|Keywords: security, telecommunication security -
PRISMATICA: a multi-sensor surveillance system for public transport networks
IET Digital Library Archive | 2004|Keywords: personal security, security -
Multiaccess scheme to ensure security in CDMA-based wireless LANs
IET Digital Library Archive | 1999|Keywords: system security, telecommunication security, security of data -
The Electricity at Work Regulations 1989
IET Digital Library Archive | 1989|Keywords: safety, electrical safety -
Low voltage networks operational neutral interruption impact assessment
IET Digital Library Archive | 2005|Keywords: electrical safety, utilisation device safety -
Certifying content of information displays and manuals
IET Digital Library Archive | 1998|Keywords: safety, safety-critical software, safety-related software, safety-critical systems -
Will viruses leap to mobiles?
IET Digital Library Archive | 2006|Keywords: telecommunication security -
High-speed security
IET Digital Library Archive | 2004|Keywords: network security, telecommunication security -
Power system security
IET Digital Library Archive | 2002|Keywords: security measures, power system security -
Design conflicts in meeting EMC and safety requirements
IET Digital Library Archive | 1999|Keywords: safety requirements, safety, safety performance -
CaDI, Cable Distribution, Interactive, a structured way to get feedback
IET Digital Library Archive | 1994|Keywords: security, security of data -
Packet level access control scheme for internetwork security
IET Digital Library Archive | 1992|Keywords: DES security algorithm, internetwork security, RSA security algorithm -
Is your IPAQ talking to me?
IET Digital Library Archive | 2003|Keywords: security standards, security overseers, security threats, telecommunication security -
Electrical apparatus for flammable atmospheres: intrinsic safety
IET Digital Library Archive | 1991|Keywords: intrinsic safety, safety -
Influence of nuclear safety requirements for CEGB gas cooled reactors on the design of their electrical auxiliary systems
IET Digital Library Archive | 1981|Keywords: fission reactor safety, nuclear safety requirements -
Modern data encryption
IET Digital Library Archive | 1993|Keywords: security services, communications security -
Security in current systems
IET Digital Library Archive | 1995|Keywords: security, security of data -
Is this WAP we've been waiting for? Using smart mobile technology in the field
IET Digital Library Archive | 2005|Keywords: security, security issues -
A fresh concept using pattern recognition to improve power system security
IET Digital Library Archive | 2000|Keywords: power system security, operational security measures, power system security improvement -
Smart phones: threat or opportunity for a secure mobile?
IET Digital Library Archive | 2005|Keywords: telecommunication security -
Cryptanalysis of a data security protection scheme for VoIP
IET Digital Library Archive | 2006|Keywords: hierarchical data security protection scheme, telecommunication security -
Some comments on damgard's hashing principle
IET Digital Library Archive | 1990|Keywords: security improvement -
Discussion on “Influence of nuclear safety requirements for CEGB gas cooled reactors on the design of their electrical auxiliary systems”
IET Digital Library Archive | 1981Keywords: fission reactor safety, nuclear safety requirements -
Implications of security mechanisms on performance enhancing proxies
IET Digital Library Archive | 2003|Keywords: security mechanisms, telecommunication security -
Security evaluation of composite power systems
IET Digital Library Archive | 1995|Keywords: security evaluation, power system security -
Towards safer electrical installations - learning the lessons
IET Digital Library Archive | 1998|Keywords: safety, electrical installations safety -
Advanced mobile security in silicon
IET Digital Library Archive | 2004|Keywords: advanced mobile security, telecommunication security -
Transcript of Stephen Timms' speech at IEE event keynote address. "How secure are Britain's electricity supplies?" 13 May 2004, The IEE, Savoy Place, London
IET Digital Library Archive | 2004|Keywords: supply security, power system security, energy security -
Designing buildings for the wireless age [FSS]
IET Digital Library Archive | 2004|Keywords: security, telecommunication security -
Sensitivity analysis for transient stability
IET Digital Library Archive | 1998|Keywords: security margin, security control
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.