Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Sleight of hand [embedded system security]
IET Digital Library Archive | 2004|Keywords: data security, telecommunication security, end customer security, security of data, embedded system security -
A security mechanism for remote configuration of substation communication
IET Digital Library Archive | 2006|Keywords: security mechanism, security communication channel, telecommunication security, information security -
Advanced small-signal security assessment tools for power systems
IET Digital Library Archive | 2006|Keywords: voltage security assessment, dynamic security assessment, transient security assessment, power system security, small-signal security assessment -
Packets in peril [voice over IP security issues]
IET Digital Library Archive | 2004|Keywords: voice over IP security, security threats, telecommunication security, security of data -
The security deployment of early IMS
IET Digital Library Archive | 2005|Keywords: security deployment, 3GPP TS 33.203 security features, roaming security, signaling security, NAT security, interworking security, telecommunication security -
Technical and administrative cyber security issues with implementation of a SCADA security upgrade
IET Digital Library Archive | 2005|Keywords: technical cyber security issues, administrative cyber security issues, security of data, SCADA security upgrade -
Providing safety, security and integrity: technology for civilian coastal radar
IET Digital Library Archive | 2006|Keywords: safety, security, marine safety, national security -
Welcome to the wireless world
IET Digital Library Archive | 2006|Keywords: security, telecommunication security -
The challenge of keeping applications secure
IET Digital Library Archive | 2004|Keywords: telecommunication security, security loopholes, 3G security -
Analyse of the application schemes for the wireless network security
IET Digital Library Archive | 2006|Keywords: telecommunication security, wireless network security -
Security techniques
IET Digital Library Archive | 1995|Keywords: telecommunications security, security mechanisms, security techniques, security of data -
A review of Bluetooth security in the automotive environment
IET Digital Library Archive | 2004|Keywords: Bluetooth security, security risks, security of data, telecommunication security -
Network characteristics to support end-to-end security between mobile devices
IET Digital Library Archive | 2005|Keywords: telecommunication security, end-to-end security -
Can GIS switchgear keep what it promises? Requirements towards an up to date gas insulated switchgear design and their realization
IET Digital Library Archive | 2006|Keywords: safety, security, power system security -
Is RFID automating crime?
IET Digital Library Archive | 2006|Keywords: RFID security, security of data -
Is GSM still secure?
IET Digital Library Archive | 2004|Keywords: telecommunication security, security evolution -
UMTS security
IET Digital Library Archive | 2002|Keywords: UMTS security, telecommunication security, security of data -
EMC and the safety case
IET Digital Library Archive | 2003|Keywords: safety, EMC safety requirements, safety risk, safety case -
Modified Chang-Hwang-Wu access control scheme
IET Digital Library Archive | 1993|Keywords: security classes, security levels -
Existing wireless network security mechanisms and their limitations for ad hoc networks
IET Digital Library Archive | 2006|Keywords: telecommunication security, wireless network security mechanism -
Network security - who's responsible? [Ethernet in plant floor automation applications]
IET Digital Library Archive | 2004|Keywords: network security, safety systems, security risks, telecommunication security -
Work of the regional electricity companies to provide a safer substation environment for both operators and public. Introduction and Part 1: Performance - “the good, the bad and the ugly”
IET Digital Library Archive | 1997|Keywords: safety, public safety, design safety, operator safety -
Secure and efficient web metering scheme
IET Digital Library Archive | 2005|Keywords: telecommunication security, security of data -
Overview of IEC 61508. Design of electrical/electronic/programmable electronic safety-related systems
IET Digital Library Archive | 2000|Keywords: safety-critical software, electrical safety-related systems, safety systems, safety-related applications, electronic safety-related systems -
Functional safety in application of programmable devices in power system protection and automation
IET Digital Library Archive | 2004|Keywords: safety integrity levels, functional safety, health and safety executive, health and safety -
Experiences in securing a regional telemetry system
IET Digital Library Archive | 2005|Keywords: information security strategy, security of data -
Transmission network expansion planning with security constraints
IET Digital Library Archive | 2005|Keywords: security constraint, power system security -
Novel m-commerce security protocol for third generation mobile networks
IET Digital Library Archive | 2003|Keywords: m-commerce security protocol, security threats, telecommunication security -
RFID - a new solution technology for security problems
IET Digital Library Archive | 1995|Keywords: security problems, security arena, security -
Digital signature scheme based on error-correcting codes
IET Digital Library Archive | 1990|Keywords: data security, security -
Effectiveness of different design solutions to control internal faults in MV switchgear
IET Digital Library Archive | 1997|Keywords: safety, public safety, personnel safety, safety standards -
VoIP insecurity
IET Digital Library Archive | 2006|Keywords: security of data, telecommunication security, proactive security strategy -
Smart card based end-to-end security for TETRA radio networks
IET Digital Library Archive | 2003|Keywords: security services, telecommunication security, smart card based end-to-end security -
Securing next generation mobile networks
IET Digital Library Archive | 2004|Keywords: network security, mobile network security architecture, security threats, telecommunication security -
High-security asynchronous circuit implementation of AES
IET Digital Library Archive | 2006|Keywords: highly balanced security latches, high-security asynchronous circuit -
Real time data transmission over GSM voice channel for secure voice & data applications
IET Digital Library Archive | 2004|Keywords: telecommunication security, data communication security -
Novel authenticated key management framework for ad hoc network security
IET Digital Library Archive | 2006|Keywords: ad hoc network security, telecommunication security -
Legal requirements
IET Digital Library Archive | 1998|Keywords: safety, Health and Safety at Work Act, electrical installation safety -
Securing airwave's future
IET Digital Library Archive | 2004|Keywords: safety, telecommunication security, airwave security, public safety community -
Machine safety using a detachable fieldbus connection
IET Digital Library Archive | 2004|Keywords: safety systems, programmable safety system, Pilz safety controller, machine safety -
Gambling on chips [radiofrequency identification chips - security]
IET Digital Library Archive | 2006|Keywords: RFID security, security of data -
Thwarting VoIP threats
IET Digital Library Archive | 2005|Keywords: telecommunication security, VoIP security threat thwarting -
Towards safer electrical installations - learning the lessons. Legal requirements
IET Digital Library Archive | 1999|Keywords: safety, Health and Safety at Work Act, electrical installations safety -
Extending 2G end-to-end security solutions to 3G networks
IET Digital Library Archive | 2003|Keywords: end-to-end security solutions, telecommunication security -
New applications of p-subgroup problems in broadcast encryption services
IET Digital Library Archive | 2006|Keywords: security, telecommunication security -
Securing communications networks
IET Digital Library Archive | 2005|Keywords: security issues, network security monitoring -
P2P networking comes of age
IET Digital Library Archive | 2006|Keywords: security of data, telecommunication security, homeland security -
Hardware-software implementation of public-key cryptography for wireless sensor networks
IET Digital Library Archive | 2006|Keywords: wireless sensor networks security, telecommunication security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.