Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services
Springer Verlag | 2020|Keywords: Systems and Data Security -
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Springer Verlag | 2020|Keywords: Systems and Data Security -
Two-Party Computing with Encrypted Data
Free accessSpringer Verlag | 2007|Keywords: Systems and Data Security -
Towards a Unified Security Model for Physically Unclonable Functions
Springer Verlag | 2016|Keywords: Systems and Data Security -
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation
Springer Verlag | 2018|Keywords: Systems and Data Security -
The Combinatorics of Product Scanning Multiplication and Squaring
Springer Verlag | 2017|Keywords: Systems and Data Security -
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
Springer Verlag | 2020|Keywords: Systems and Data Security -
Special issue on security and privacy of blockchain technologies
Online Contents | 2020|Keywords: Datensicherung -
Sliding encryption: A cryptographic tool for mobile agents
Springer Verlag | 2006|Keywords: Systems and Data Security -
Signatures Resilient to Continual Leakage on Memory and Computation
Free accessSpringer Verlag | 2011|Keywords: Systems and Data Security -
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Springer Verlag | 2013|Keywords: Systems and Data Security -
Sequential Aggregate Signatures Made Shorter
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications
Free accessSpringer Verlag | 2011|Keywords: Systems and Data Security -
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Secret Swarm Unit Reactive k −Secret Sharing
(Extended Abstract)Springer Verlag | 2007|Keywords: Systems and Data Security -
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic
Springer Verlag | 2022|Keywords: Systems and Data Security -
Scalable Group Signatures with Revocation
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge
Free accessSpringer Verlag | 2011|Keywords: Systems and Data Security -
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
Springer Verlag | 2021|Keywords: Systems and Data Security -
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)
Springer Verlag | 2008|Keywords: Systems and Data Security -
Proactive Secret Sharing with a Dishonest Majority
Springer Verlag | 2016|Keywords: Systems and Data Security -
Privacy Threats in E-Shopping (Position Paper)
Springer Verlag | 2016|Keywords: Systems and Data Security -
Privacy-Preserving Information Markets for Computing Statistical Data
Springer Verlag | 2009|Keywords: Systems and Data Security -
Privacy Preserving Data Mining within Anonymous Credential Systems
Springer Verlag | 2008|Keywords: Systems and Data Security -
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs
Springer Verlag | 2018|Keywords: Systems and Data Security -
Preimage Attack on the Parallel FFT-Hashing Function
Springer Verlag | 2007|Keywords: Systems and Data Security -
Order-Preserving Encryption Secure Beyond One-Wayness
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
On the Security of Hash Functions Employing Blockcipher Postprocessing
Free accessSpringer Verlag | 2011|Keywords: Systems and Data Security -
On the Portability of Generalized Schnorr Proofs
Free accessSpringer Verlag | 2009|Keywords: Systems and Data Security -
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Springer Verlag | 2016|Keywords: Systems and Data Security -
On the Evolution of User Authentication: Non-bilateral Factors
Springer Verlag | 2008|Keywords: Systems and Data Security -
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games
Springer Verlag | 2012|Keywords: Systems and Data Security -
On Offline Payments with Bitcoin (Poster Abstract)
Springer Verlag | 2014|Keywords: Systems and Data Security -
On assurance structures for WWW commerce
Springer Verlag | 1998|Keywords: Systems and Data Security -
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
Springer Verlag | 2014|Keywords: Systems and Data Security -
Multi-location Leakage Resilient Cryptography
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
Free accessSpringer Verlag | 1998|Keywords: Systems and Data Security -
Mirrored Commitment: Fixing “Randomized Partial Checking” and Applications
Springer Verlag | 2024|Keywords: Systems and Data Security -
Midgame Attacks and Defense Against Them
Springer Verlag | 2023|Keywords: Systems and Data Security -
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
Springer Verlag | 2008|Keywords: Systems and Data Security -
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Leakage Resilient Strong Key-Insulated Signatures in Public Channel
Springer Verlag | 2011|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.