Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Kulinowski to lead Chemical Safety Board
American Chemical Society | 2018Keywords: Industrial safety, Chemical Safety Board, safety -
On Diamond Structures and Trojan Message Attacks
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
On the Security of One-Witness Blind Signature Schemes
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES^2
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Computational Fuzzy Extractors
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
``Comply or Die'' Is Dead: Long Live Security-Aware Principal Agents
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
Constrained Pseudorandom Functions and Their Applications
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Efficient General-Adversary Multi-Party Computation
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
A Modular Framework for Building Variable-Input-Length Tweakable Ciphers
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Families of Fast Elliptic Curves from Q-curves
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Resilience Engineering's Potential for Advanced Air Mobility (AAM)
NTIS | 2021|Keywords: Transportation Safety, Safety-ii, Aviation safety -
On the Design and Engineering of a Zero Trust Security Artefact
Springer Verlag | 2021|Keywords: Zero Trust security, Digital Security, Managed Security Services (MSS), Security Operation Centre (SOC), Security strategy, Security Orchestration -
SPHF-Friendly Non-interactive Commitments
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Warning users about cyber threats through sounds
Free accessDOAJ | 2021|Keywords: cyber security, Web security -
Simulating Reservoir System Operation Under Given Scenarios to Determine Operating Policy with the ‘Good’ Resilience
Springer Verlag | 2017|Keywords: Security, Crime Control and Security, Systems and Data Security, Security Science and Technology -
The complexity of the defensive domination problem in special graph classes
Elsevier | 2019|Keywords: Security -
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Naturally Rehearsing Passwords
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Fully Homomorphic Message Authenticators
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Between a Rock and a Hard Place: Interpolating between MPC and FHE
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Tamper Resilient Circuits: The Adversary at the Gates
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
The Flat-Shamir Transformation in a Quantum World
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Cryptanalysis of HMAC/NMAC-Whirlpool
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Grundlagen und Anwendung von Information Security Awareness : Mitarbeiter zielgerichtet für Informationssicherheit sensibilisieren
TIBKAT | 2019|Keywords: Systems and Data Security, Computer security -
Behind the Scene of Side Channel Attacks
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Notions of Black-Box Reductions, Revisited
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Function-Private Subspace-Membership Encryption and Its Applications
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
Enterprise Defense Strategies Against Ransomware Attacks
Protection Against Ransomware Attacks on Corporate EnvironmentSpringer Verlag | 2019|Keywords: Security -
Fair and Efficient Secure Multiparty Computationi with Reputation Systems
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
How to Construct an Ideal Cipher from a Small Set of Public Permutations
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Information Security as a Credence Good
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
Theory Foundation of SAGIN Security
Springer Verlag | 2023|Keywords: Mobile and Network Security, Systems and Data Security, Security Science and Technology -
Entangling Relations : American Foreign Policy in Its Century
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2020|Keywords: National security -
Diversification of Aviation Safety Management on the Basis of Differences Between GA and CAT
Free accessDOAJ | 2019|Keywords: safety, safety indicators, Industrial safety. Industrial accident prevention -
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference
British Library Conference Proceedings | 2013|Keywords: Usable security, Security -
Improved Cryptanalysis of Reduced RIPEMD-160
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.