Year of publication
Type of media
Source
Subject
Type of material
Licence
1–20 of 7,819 hits
Sort by:
Sort by:
-
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archive | 2007|Keywords: Sicherheit, beweisbare Sicherheit -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Tema Archive | 2014|Keywords: Sicherheit -
SENTINEL: Securing Legacy Firefox Extensions
Tema Archive | 2015|Keywords: Web-Browser-Sicherheit, Browser-Sicherheit -
The Impact of Standards in Web Services Security
Tema Archive | 2014|Keywords: Sicherheit, Web-Services-Sicherheit, Services-Sicherheit -
Security of the Internet of Things: perspectives and challenges
Tema Archive | 2014|Keywords: Sicherheit -
DNSSEC: a protocol toward securing the Internet infrastructure
Tema Archive | 2007|Keywords: Sicherheit, Internet-Sicherheit -
There's nothing ‘smart’ about insecure connected devices
Tema Archive | 2014|Keywords: IT-Sicherheit, Netzwerk-Sicherheit -
Scalable packet classification with controlled cross-producting
Tema Archive | 2009|Keywords: Sicherheit -
Cyber situational awareness through network anomaly detection: state of the art and new approaches
Tema Archive | 2015|Keywords: IT-Sicherheit, Sicherheit, nationale Sicherheit -
Identity- und Access-Management mit EAI-Konzepten und -Technologien
Tema Archive | 2008|Keywords: Anwender-Account-Sicherheit, Sicherheit -
Funknetze sicher planen. Ganzheitliche Abdeckung und Zugriffssicherheit als Herausforderung
Tema Archive | 2009|Keywords: WLAN-Sicherheit, Sicherheit -
Secure relay selection based on learning with negative externality in wireless networks
Tema Archive | 2013|Keywords: Sicherheit -
Remaining capacity estimation of Li-ion batteries based on temperature sample entropy and particle filter
Tema Archive | 2014|Keywords: Sicherheit -
Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance
Tema Archive | 2010|Keywords: Sicherheit, nationale Sicherheit -
An overview of anomaly detection techniques: existing solutions and latest technological trends
Tema Archive | 2007|Keywords: Sicherheit -
Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit -
Feuer im Labor. Estland wird zu Europas Testfeld für Internet-Sicherheit und E-Government. Auch für den Cyber-Krieg
Tema Archive | 2007|Keywords: aktuelle Internet-Sicherheit, Internet-Services-Sicherheit, Internet-Sicherheit -
Betriebliches Identitätsmanagement - Ein Rahmenwerk zur Entscheidungsunterstützung auf Basis des Balanced-Scorecard-Konzepts
Tema Archive | 2009|Keywords: Sicherheit, IT-Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.