Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
``Comply or Die'' Is Dead: Long Live Security-Aware Principal Agents
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
``IT'' Infrastructure Protection From Malicious Codes and Malware Protection System using Controlled Environment
British Library Conference Proceedings | 2012|Keywords: Information security -
``SRA into SRA'' - Structural reliability analyses into system risk assessment: Activities of an ESReDA project group
British Library Conference Proceedings | 2010|Keywords: Structural safety -
``Trusted'' Computing Technologies Opportunities and Problems
British Library Conference Proceedings | 2006|Keywords: Computer security -
`VaP' a tool for practicing engineers
British Library Conference Proceedings | 1993|Keywords: structural safety -
`Virtual' Security Teaching Techniques - Teaching IA methods using VMWare Teams
British Library Conference Proceedings | 2007|Keywords: Computer security -
^2^1^0Po / ^2^1^0Pb RATIO IN AIR AND RAIN WATER SAMPLES IN THE ENVIRONMENT OF COASTAL KARNATAKA AND KAIGA
British Library Conference Proceedings | 2001|Keywords: radiation safety aspects -
^2^2^2Rn CONCENTRATION IN DIFFERENT SOURCES OF WATER AT KALPAKKAM ENVIRONMENT
British Library Conference Proceedings | 2001|Keywords: radiation safety aspects -
$$\lambda _{d}$$ -Statistical Convergence, $$\lambda _{d}$$ -statistical Boundedness and Strong $$\left( V,\lambda \right) _{d}-$$ summability in Metric Spaces
Springer Verlag | 2017|Keywords: Security -
$$\mathcal {I}_\lambda $$ -double Statistically Convergent Sequences in Topological Groups
Springer Verlag | 2017|Keywords: Security -
$$\mathsf {CENCPP}^*$$: beyond-birthday-secure encryption from public permutations
Online Contents | 2022|Keywords: Provable security -
$${\varvec{1/p}}$$-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds
Online Contents | 2020|Keywords: 1/p-Security -
$ B_{1} $ field-insensitive transformers for RF-safe transmission lines
Online Contents | 2006|Keywords: RF safety -
$ B_{1} $ field-insensitive transformers for RF-safe transmission lines
Online Contents | 2006|Keywords: RF safety -
$ CO_{2} $ Plume Evolution and Pressure Buildup of Large-scale $ CO_{2} $ Injection into Saline Aquifers in Sanzhao Depression, Songliao Basin, China
Online Contents | 2012|Keywords: Storage security -
$ CO_{2} $ Plume Evolution and Pressure Buildup of Large-scale $ CO_{2} $ Injection into Saline Aquifers in Sanzhao Depression, Songliao Basin, China
Online Contents | 2012|Keywords: Storage security -
1.1 Principles of fission reactors
1 Nuclear fission energyLandolt-Börnstein / Springer Materials | 2005|Keywords: safety analysis -
1.2.1 Overview of different reactor types, 1.2 Nuclear power plants
1 Nuclear fission energyLandolt-Börnstein / Springer Materials | 2005|Keywords: safety analysis
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.