Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
Springer Verlag | 2021|Keywords: Adaptive security, Chosen-ciphertext security, Mobile and Network Security -
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Hard Invalidation of Electronic Signatures
Springer Verlag | 2015|Keywords: Systems and Data Security -
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Springer Verlag | 2016|Keywords: Systems and Data Security -
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs
Springer Verlag | 2018|Keywords: Systems and Data Security -
Privacy Threats in E-Shopping (Position Paper)
Springer Verlag | 2016|Keywords: Systems and Data Security -
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
Springer Verlag | 2014|Keywords: Systems and Data Security -
Group Encryption: Non-interactive Realization in the Standard Model
Free accessSpringer Verlag | 2009|Keywords: provable security -
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Springer Verlag | 2013|Keywords: Systems and Data Security -
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE
Springer Verlag | 2021|Keywords: Replayable CCA security -
Scalable Group Signatures with Revocation
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Cliptography: Clipping the Power of Kleptographic Attacks
Springer Verlag | 2016|Keywords: Systems and Data Security -
Differentially-Private “Draw and Discard” Machine Learning: Training Distributed Model from Enormous Crowds
Springer Verlag | 2022|Keywords: Systems and Data Security -
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
Free accessSpringer Verlag | 2010|Keywords: Systems and Data Security -
Group Signatures with Almost-for-Free Revocation
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Free accessSpringer Verlag | 2009|Keywords: Systems and Data Security -
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Springer Verlag | 2013|Keywords: Systems and Data Security -
A Little Honesty Goes a Long Way
Free accessThe Two-Tier Model for Secure Multiparty ComputationSpringer Verlag | 2015|Keywords: Systems and Data Security -
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)
Springer Verlag | 2008|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.