Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
Online Contents | 2015|Keywords: Security, SK-security -
Security Optimization of Two-Hop AF Cooperative Relay Network
Online Contents | 2019|Keywords: Security outage probability, Security capacity -
Comments on “A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things”
Online Contents | 2020|Keywords: Security protocol -
The Feasibility of Launching Rogue Transmitter Attacks in Indoor Visible Light Communication Networks
Free accessOnline Contents | 2017|Keywords: Physical layer security, Network security -
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Online Contents | 2015|Keywords: Security zones, Mobile security -
Privacy-Preserving Mutual Authentication in RFID with Designated Readers
Online Contents | 2017|Keywords: RFID security -
A collaborative policy-based security scheme to enforce resource access controlling mechanism
Online Contents | 2019|Keywords: Security policy, Android system security, Security profile -
Understanding users’ perceptions to improve fallback authentication
Online Contents | 2021|Keywords: Usable security, Security questions -
Accountability and Q-Accountable Logging in Wireless Networks
Online Contents | 2014|Keywords: Security -
A Survey on Architecture, Protocols and Challenges in IoT
Online Contents | 2020|Keywords: Security -
IoT Ecosystem: A Survey on Devices, Gateways, Operating Systems, Middleware and Communication
Online Contents | 2020|Keywords: Security -
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
Online Contents | 2022|Keywords: Chosen ciphertext security, Key-dependent-message security -
ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing
Online Contents | 2019|Keywords: Ad-hoc security, MANET security -
Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks
Online Contents | 2019|Keywords: Security -
A comprehensive survey of AI-enabled phishing attacks detection techniques
Online Contents | 2020|Keywords: Internet security, Security threats -
Interferometric key readable security holograms with secrete-codes
Online Contents | 2007|Keywords: security hologram, Optical security -
Improved Network Traffic by Attacking Denial of Service to Protect Resource Using Z-Test Based 4-Tier Geomark Traceback (Z4TGT)
Online Contents | 2020|Keywords: Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.