Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A new unified image encryption algorithm based on a lifting transformation and chaos
Elsevier | 2020|Keywords: Information security, Security analysis -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
A contribution to definition of the concept of security in legal theory
Free accessDOAJ | 2014|Keywords: security, security bodies, individual security, international security, global security -
The area-efficient gate level information flow tracking schemes of digital circuit with multi-level security lattice
Elsevier | 2023|Keywords: Hardware security, Security lattice, Security label -
Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism
Elsevier | 2023|Keywords: IoT security, Network security, Mobile cloud security, Security for Metaverse, Virtualization security, Cyber-Physical security -
Swarm Intelligence inspired Intrusion Detection Systems — A systematic literature review
Elsevier | 2021|Keywords: Network security, Data security -
Cloud Security Threats and Solutions: A Survey
Online Contents | 2022|Keywords: Security techniques, Cyber-security, Cloud security and threats -
Some aspects of security culture in information technologies
Free accessDOAJ | 2023|Keywords: security, security culture, security culture in information technologies, information security culture -
The Safety Journey: Using a Safety Maturity Model for Safety Planning and Assurance in the UK Coal Mining Industry
Free accessDOAJ | 2013|Keywords: safety culture, safety management systems, safety maturity -
State of Art of Security and Risk in Wireless Environment Along with Healthcare Case Study
Wiley | 2023|Keywords: cyber security, security attacks, security models, security & privacy -
A framework for enhancing mobile workflow execution through injection of flexible security controls
Online Contents | 2018|Keywords: Security injection, Security controls, Security modeling -
A Study on Financing Security for Smartphones Using Text Mining
Online Contents | 2017|Keywords: Smartphone security, Security, Smartphone financing security -
Security Infrastructure for Cyber Attack Targeted Networks and Services
Springer Verlag | 2022|Keywords: Security and protection, Network security, Server security, Cloud security, Device security, Security services, Infrastructure security -
An architecture to manage security operations for digital service chains
Elsevier | 2020|Keywords: Cyber-security paradigms, Security architectures -
Limits of Provable Security for Homomorphic Encryption
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Hardware/software security co-verification and vulnerability detection: An information flow perspective
Elsevier | 2023|Keywords: Hardware and software security co-verification, Information flow security, Security model, Security property -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archive | 2013|Keywords: passive Sicherheit, aktive Sicherheit -
A Composite Security Index for On-line Steady-state Security Evaluation
Taylor & Francis Verlag | 2011|Keywords: power system security, bus voltage security index, line flow security index, composite security index -
An analysis of factors contributing to household water security problems and threats in different settlement categories of Ngamiland, Botswana
Elsevier | 2013|Keywords: Water security, Human security -
Perceptions and preferences of experienced security in mass urban events – What's technology got to do with it?
Elsevier | 2023|Keywords: Experienced security, Event security, Security technology -
The regulatory challenges of Australian information security practice
Elsevier | 2016|Keywords: Information security, Information security management -
Integration of VANET and 5G Security: A review of design and implementation issues
Elsevier | 2019|Keywords: Security, VANET security standards -
On the Feasibility of Extending Oblivious Transfer
Tema Archive | 2013|Keywords: Sicherheit, statische Sicherheit -
Speculations on the science of web user security
Elsevier | 2012|Keywords: Web user security, Security science, Cyber security -
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Keywords: security attacks, security services, wireless network security, wireless security architectures -
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
Elsevier | 2022|Keywords: IoT security, IoT ecosystem security, Security requirements -
The evolution of security industry regulation in the European Union
Taylor & Francis Verlag | 2017|Keywords: Private security, security industry, security directive -
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
Online Contents | 2021|Keywords: Security protocol, Information security -
Environmental anarchy? : security in the 21st century
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2023|Keywords: Human security, Security (Psychology) -
Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks
Elsevier | 2017|Keywords: Security, Security keys -
A sentence-level text adversarial attack algorithm against IIoT based smart grid
Elsevier | 2021|Keywords: IIoT security, Smart grid security -
Von Datenrechten zu Datenzugang – Ein rechtlicher Rahmen für die europäischen Datenwirtschaft
DeGruyter | 2017|Keywords: Daten und Sicherheit -
ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)
Online Contents | 2020|Keywords: Data security, Navigation and information security -
Performance Evaluation of a Hybrid Vehicle and Sensor Network to Prevent Traffic Accidents
TIBKAT | 2020|Keywords: National security, Computer security -
A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment
Online Contents | 2016|Keywords: Vehicular security system, Security authentication, IoT security -
Security challenges with network functions virtualization
Elsevier | 2016|Keywords: Network security, Security threats -
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Online Contents | 2010|Keywords: security policy, security mangement, network security, security modeling -
Dataset to "Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things"
DataCite | 2021|Keywords: network security, security configuration -
Debating Human Security in China: Towards Discursive Power?
Taylor & Francis Verlag | 2015|Keywords: human security, security studies -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Applications and challenges of maintenance and safety engineering in industry 4.0
TIBKAT | 2020|Keywords: Industrial safety -
Die Schutzfähigkeit von Daten – Herausforderungen und Chancen für Big Data Anwender
DeGruyter | 2016|Keywords: Daten und Sicherheit -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Keywords: National security, Computer security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Food and water insecurity in specialised fishing communities: evidence from the Philippines
Wiley | 2018|Keywords: water security, Food security -
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Elsevier | 2015|Keywords: Security Attacks -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
What does energy security mean for energy-exporting countries? A closer look at the Russian energy security strategy
Taylor & Francis Verlag | 2021|Keywords: energy security, security of demand
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.