Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
The development of speech encipherment
IET Digital Library Archive | 1980|Keywords: security of data -
Structured magnetic media for data security
IET Digital Library Archive | 1981|Keywords: data security, security of data -
Simplifying key management in electronic fund transfer point of sale systems
IET Digital Library Archive | 1983|Keywords: data security, security of data -
A self-reconfiguring communications ring for distributed computer control schemes
IET Digital Library Archive | 1983|Keywords: data integrity -
Transmission code for high-speed fibre-optic data networks
IET Digital Library Archive | 1983|Keywords: data integrity -
Ring-protection mechanisms: general properties and significant implementations
IET Digital Library Archive | 1985|Keywords: security of data -
Fast algorithms for implementing RSA public key cryptosystem
IET Digital Library Archive | 1985|Keywords: data security -
Loaded highspeed computer data highway: a model to aid designers
IET Digital Library Archive | 1985|Keywords: data integrity systems -
Security of public key distribution in matrix rings
IET Digital Library Archive | 1986|Keywords: security of data -
A practical distributed secure system
IET Digital Library Archive | 1986|Keywords: security of data -
Secure data optical fibre multiple-access communication technique
IET Digital Library Archive | 1986|Keywords: security of data -
Public key cryptosystem using a reciprocal number with same intractability as factoring a large number
IET Digital Library Archive | 1987|Keywords: security of data -
kth least significant bit of a plaintext in reciprocal number cryptosystem
IET Digital Library Archive | 1987|Keywords: security of data -
Improved (conference) public-key distribution system based on matrices
IET Digital Library Archive | 1987|Keywords: data security -
Cryptographically secure pseudorandom sequence generator based on reciprocal number cryptosystem
IET Digital Library Archive | 1988|Keywords: security of data -
Public-key cryptosystem over ring Z|√−3|/(2m)
IET Digital Library Archive | 1988|Keywords: data security -
The implications of tolerancing for computer-aided mechanical design
IET Digital Library Archive | 1988|Keywords: data integrity -
Breaking one public-key distribution system based on matrix ring
IET Digital Library Archive | 1988|Keywords: data security -
Another public-key distribution system based on matrix rings
IET Digital Library Archive | 1988|Keywords: data security -
Domain-based access control for distributed computing systems
IET Digital Library Archive | 1988|Keywords: security of data -
64-channel digital TV distribution system operating at 4.4 Gbit/s
IET Digital Library Archive | 1988|Keywords: data security, security of data -
Limitations of challenge-response entity authentication
IET Digital Library Archive | 1989|Keywords: security of data -
Formal methods for database language design and constraint handling
IET Digital Library Archive | 1989|Keywords: data integrity -
Speech processing techniques for HF radio security
IET Digital Library Archive | 1989|Keywords: security of data -
Digital signature scheme based on error-correcting codes
IET Digital Library Archive | 1990|Keywords: data security -
A perspective on computer progress in the last five years
IET Digital Library Archive | 1990|Keywords: security of data -
ID-based authentication system for computer virus detection
IET Digital Library Archive | 1990|Keywords: data integrity -
Security considerations in communications systems and networks
IET Digital Library Archive | 1990|Keywords: security of data -
Attack on server assisted authentication protocols
IET Digital Library Archive | 1992|Keywords: security of data -
Improvements to internet access control security scheme
IET Digital Library Archive | 1992|Keywords: security of data -
Integration of user authentication and access control
IET Digital Library Archive | 1992|Keywords: security of data -
Computer security: mystery or science?
IET Digital Library Archive | 1992|Keywords: security of data -
Design of a physical layer security mechanism for CSMA/CD networks
IET Digital Library Archive | 1992|Keywords: security of data -
CaDI, Cable Distribution, Interactive, a structured way to get feedback
IET Digital Library Archive | 1994|Keywords: security of data -
Authenticated encryption schemes with low communication costs
IET Digital Library Archive | 1994|Keywords: data security -
Enhancing the security of El Gamal's signature scheme
IET Digital Library Archive | 1994|Keywords: data security -
Security of interactive DSA batch verification
IET Digital Library Archive | 1994|Keywords: data security -
Analysis and improvement of an access control scheme with user authentication
IET Digital Library Archive | 1994|Keywords: data security -
Security difficulties with a recently proposed chaotic based communication technique
IET Digital Library Archive | 1994|Keywords: security of data -
Analysing high-integrity systems
IET Digital Library Archive | 1994|Keywords: security of data, data integrity -
Achieving integrity in methods and language
IET Digital Library Archive | 1995|Keywords: data integrity -
Using threats to demonstrate the elements of information security
IET Digital Library Archive | 1995|Keywords: data integrity, security of data -
Performance of radial basis functions in decoding a recently proposed chaotic modulation strategy
IET Digital Library Archive | 1995|Keywords: security of data -
Security for distributed applications
IET Digital Library Archive | 1995|Keywords: security of data
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.