Year of publication
Type of material
Licence
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
File server architecture for an open distributed document system
Free accessSpringer Verlag | 1995|Keywords: Data integrity -
Data Protection in Communications and Storage
Free accessSpringer Verlag | 1995|Keywords: Data Integrity -
Datensicherung an den Fakultaeten der Technischen Universitaet Chemnitz-Zwickau
Free accessBASE | 1995|Keywords: Datensicherung -
A Taxonomy for Analyzing Hazards to Information Systems
Free accessSpringer Verlag | 1996|Keywords: Data Security -
PMES: Privilege management and enforcement system for secure distributed resource sharing
Free accessSpringer Verlag | 1996|Keywords: Data security -
Efficient and provably secure key agreement
Free accessSpringer Verlag | 1996|Keywords: Data security -
Security requirements and solutions in distributed Electronic Health Records
Free accessSpringer Verlag | 1997|Keywords: data security -
A taxonomy of five elements to evaluate a secure network
Free accessSpringer Verlag | 1997|Keywords: Security of data -
Managing with Less than Absolute Integrity
Free accessSpringer Verlag | 1997|Keywords: data integrity -
Database usage and requirements in intelligent networks
Free accessSpringer Verlag | 1997|Keywords: data security -
Secure group communication: a dynamic approach
Free accessSpringer Verlag | 1997|Keywords: data security -
All-or-nothing encryption and the package transform
Free accessSpringer Verlag | 1997|Keywords: Systems and Data Security -
Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
Free accessSpringer Verlag | 1997|Keywords: Systems and Data Security -
The design of the ICE encryption algorithm
Free accessSpringer Verlag | 1997|Keywords: Systems and Data Security -
Advanced Encryption Standard
Free accessDraft minimum requirements and evaluation criteriaSpringer Verlag | 1997|Keywords: Systems and Data Security -
Attacking Triple Encryption
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Higher Order Differential Attack of a CAST Cipher
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Easy come — Easy go divisible cash
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Secure and efficient metering
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Secret sharing schemes with bipartite access structure
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Specialized integer factorization
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Improved algorithms for isomorphisms of polynomials
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Differential Cryptanalysis of the ICE Encryption Algorithm
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Managing Data Quality and Integrity in Federated Databases
Free accessSpringer Verlag | 1998|Keywords: Data Integrity -
An efficient discrete log pseudo random generator
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Cryptanalysis of the Chor-Rivest cryptosystem
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
On concrete security treatment of signatures derived from identification
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Improved cryptanalysis of RC5
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Cryptanalytic Attacks on Pseudorandom Number Generators
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Serpent: A New Block Cipher Proposal
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Universally verifiable mix-net with verification work independent of the number of mix-servers
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
New results on multi-receiver authentication codes
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
New Results in Linear Cryptanalysis of RC5
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Computing discrete logarithms with quadratic number rings
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Breaking RSA may not be equivalent to factoring
Free accessExtended abstractSpringer Verlag | 1998|Keywords: Systems and Data Security -
About Feistel Schemes with Six (or More) Rounds
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
The First Two Rounds of MD4 are Not One-Way
Free accessExtended AbstractSpringer Verlag | 1998|Keywords: Systems and Data Security -
On the Security of the Hashing Scheme Based on SL 2
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Highly nonlinear balanced Boolean functions with a good correlation-immunity
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Differential-linear weak key classes of IDEA
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Speeding up discrete log and factoring based schemes via precomputations
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Fast Hashing and Stream Encryption with Panama
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.