Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Game Theory for Managing Security in Chemical Industrial Areas
TIBKAT | 2018|Keywords: Innere Sicherheit, Sicherheit -
Geschichte der Sicherheit : Entwicklung - Themen - Perspektiven
TIBKAT | 2018|Keywords: Soziale Sicherheit, Sicherheit, Kollektive Sicherheit, Internationale Sicherheit, Innere Sicherheit -
Die Polizei : unabhängige, interdisziplinäre Fachzeitschrift für öffentliche und private Sicherheit
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 1.1904 - 38.1941,10(Mai); N.S. 1[=39].1948 - 7=45.1954,24; 51.1960,4 -|Keywords: Innere Sicherheit, Sicherheit und Ordnung -
Geschichte der Sicherheit : Entwicklung - Themen - Perspektiven
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2018|Keywords: Soziale Sicherheit, Sicherheit, Kollektive Sicherheit, Internationale Sicherheit, Innere Sicherheit -
Application of System Dynamics to Water Security Research
Online Contents | 2013|Keywords: Security in flood control and disaster mitigation, Water resource security, Water security, Water environment security -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Limits of Provable Security for Homomorphic Encryption
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Development of a safety management system (SMS) for drilling and servicing operations within OSHA jurisdiction area of Texas
Online Contents | 2017|Keywords: Process safety, Safety management system, Personnel safety -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archive | 2013|Keywords: passive Sicherheit, aktive Sicherheit -
Determinants for conducting food safety culture research
Online Contents | 2016|Keywords: Food safety performance, Food safety culture, Safety culture, Food safety management system -
On the Feasibility of Extending Oblivious Transfer
Tema Archive | 2013|Keywords: Sicherheit, statische Sicherheit -
Performance Evaluation of a Hybrid Vehicle and Sensor Network to Prevent Traffic Accidents
TIBKAT | 2020|Keywords: National security, Computer security -
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Online Contents | 2010|Keywords: security policy, security mangement, network security, security modeling -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Keywords: National security, Computer security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Verbundprojekt: Sicherheit der Nasslager für abgebrannte Brennelemente: Experimentelle Analyse, Modellbildung und Validierung für System- und CFD-Codes : Schlussbericht : Teilprojekt: Simulation von Strömung und Wärmetransport in Brennelementen unter den Bedingungen eines Lagerbeckens : FuE-Programm: Nukleare Sicherheits- und Entsorgungsforschung : Projektlaufzeit: 01.10.2013-30.09.2019
TIBKAT | 2020|Keywords: Sicherheit -
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Keywords: National security, Computer security -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Sicherheit der Nasslager für abgebrannte Brennelemente : Abschlussbericht SINABEL : Teilprojekt D
TIBKAT | 2020|Keywords: Sicherheit -
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Online Contents | 2015|Keywords: Security zones, Mobile security -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Keywords: National security, Computer security -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Keywords: Safety PLC, Safety integrity, Safety function -
Citizen confidence in private security guards in Portugal
Online Contents | 2015|Keywords: private security, private security guards, Citizen confidence in private security guards, perceptions of private security guards, Security services -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Worldwide cyber security
British Library Conference Proceedings | 2012|Keywords: Cyber security, Security -
Catalytic pyrolysis of plastic waste: A review
Online Contents | 2016|Keywords: Technische Sicherheit -
The Scandinavian Approach to Private Maritime Security-A Regulatory Façade?
Online Contents | 2015|Keywords: private security, National security, Security management, maritime security, Security services -
Insights into the mechanism of cationic dye adsorption on activated charcoal: the importance of π-π interactions
Online Contents | 2017|Keywords: Technische Sicherheit -
Provably Secure Higher-Order Masking of AES
Tema Archive | 2011|Keywords: physikalische Security, Sicherheit, beweisbare Sicherheit -
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archive | 2007|Keywords: Sicherheit, beweisbare Sicherheit -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Adsorption of heavy metals from wastewater graphic industry using clinoptilolite zeolite as adsorbent
Online Contents | 2017|Keywords: Technische Sicherheit -
Process safety indicators, a review of literature
Online Contents | 2016|Keywords: Safety management, Occupational safety -
Use of membrane technology for oil field and refinery produced water treatment—A review
Online Contents | 2016|Keywords: Technische Sicherheit -
Insights into the mechanism of cationic dye adsorption on activated charcoal: The importance of π–π interactions
Online Contents | 2017|Keywords: Technische Sicherheit -
Security and management framework for an organization operating in cloud environment
Online Contents | 2017|Keywords: Security framework for cloud, Security for cloud, Security requirements for cloud environment, Security and management framework for cloud -
Die Polizei : unabhängige, interdisziplinäre Fachzeitschrift für öffentliche und private Sicherheit
TIBKAT | 1.1904 - 38.1941,10(Mai); N.S. 1[=39].1948 - 7=45.1954,24; 51.1960,4 -|Keywords: Innere Sicherheit, Sicherheit und Ordnung -
Isotherm, kinetic and thermodynamic studies on the adsorption behaviour of textile dyes onto chitosan
Online Contents | 2017|Keywords: Technische Sicherheit -
Tetracycline adsorption by H3PO4-activated carbon produced from apricot nut shells: A batch study
Online Contents | 2016|Keywords: Technische Sicherheit -
Recycling and utilization assessment of waste fired clay bricks (Grog) with granulated blast-furnace slag for geopolymer production
Online Contents | 2016|Keywords: Technische Sicherheit -
The diffusion behavior law of respirable dust at fully mechanized caving face in coal mine: CFD numerical simulation and engineering application
Online Contents | 2017|Keywords: Technische Sicherheit -
Methods and models in process safety and risk management: Past, present and future
Online Contents | 2015|Keywords: Technische Sicherheit -
Tin Dioxide as a Photocatalyst for Water Treatment: A Review
Online Contents | 2017|Keywords: Technische Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.