Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic
Springer Verlag | 2022|Keywords: Systems and Data Security, Security Services, Mobile and Network Security -
GDPR – Challenges for Reconciling Legal Rules with Technical Reality
Springer Verlag | 2020|Keywords: Security, Systems and Data Security, Mobile and Network Security -
Compactly Hiding Linear Spans
Free accessTightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and ApplicationsSpringer Verlag | 2015|Keywords: Security tightness, CCA2 security, Systems and Data Security -
Mirrored Commitment: Fixing “Randomized Partial Checking” and Applications
Springer Verlag | 2024|Keywords: Systems and Data Security, Security Services -
Correction to: Science of Cyber Security
Springer Verlag | 2021|Keywords: Systems and Data Security -
Towards a Unified Security Model for Physically Unclonable Functions
Springer Verlag | 2016|Keywords: Security model, Systems and Data Security -
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security
Free accessSpringer Verlag | 2014|Keywords: IND-CCA2 security, tight security, Systems and Data Security -
Efficient Circuit-Size Independent Public Key Encryption with KDM Security
Free accessSpringer Verlag | 2011|Keywords: Security Parameter, Security Proof, Systems and Data Security -
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups
Springer Verlag | 2020|Keywords: Proactive security, Mobile and Network Security, Systems and Data Security -
Traceable Group Encryption
Free accessSpringer Verlag | 2014|Keywords: provable security, Systems and Data Security -
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions
Springer Verlag | 2023|Keywords: Security Services, Mobile and Network Security -
Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services
Springer Verlag | 2020|Keywords: Systems and Data Security, Mobile and Network Security -
Fully Forward-Secure Group Signatures
Springer Verlag | 2012|Keywords: Security Modeling, Forward Security, Systems and Data Security -
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files
Springer Verlag | 2022|Keywords: Systems and Data Security, Mobile and Network Security -
Key Evolution Systems in Untrusted Update Environments
Springer Verlag | 2009|Keywords: Security Notion, Forward Security, Systems and Data Security -
Order-Preserving Encryption Secure Beyond One-Wayness
Free accessSpringer Verlag | 2014|Keywords: security notions, Systems and Data Security -
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
Springer Verlag | 2021|Keywords: RCCA security, Systems and Data Security -
Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance
Springer Verlag | 2021|Keywords: Systems and Data Security, Mobile and Network Security -
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
Free accessSpringer Verlag | 2015|Keywords: Provable security, Systems and Data Security -
Proactive Secret Sharing with a Dishonest Majority
Springer Verlag | 2016|Keywords: Systems and Data Security -
On Offline Payments with Bitcoin (Poster Abstract)
Springer Verlag | 2014|Keywords: Additional Security Parameter, Systems and Data Security -
A New Randomness Extraction Paradigm for Hybrid Encryption
Free accessSpringer Verlag | 2009|Keywords: Chosen-ciphertext security, Systems and Data Security -
HBSS: (Simple) Hash-Based Stateless Signatures – Hash All the Way to the Rescue!
(Preliminary Version)Springer Verlag | 2023|Keywords: Systems and Data Security -
Midgame Attacks and Defense Against Them
Springer Verlag | 2023|Keywords: Midgame Security, Systems and Data Security -
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
Free accessSpringer Verlag | 2012|Keywords: chosen-ciphertext security, Systems and Data Security -
The Combinatorics of Product Scanning Multiplication and Squaring
Springer Verlag | 2017|Keywords: Systems and Data Security, Security -
Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack
Springer Verlag | 2016|Keywords: Security threats, Systems and Data Security -
Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!
Springer Verlag | 2023|Keywords: Mobile and Network Security -
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation
Springer Verlag | 2018|Keywords: Systems and Data Security -
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model
Free accessSpringer Verlag | 2007|Keywords: Security Parameter, Systems and Data Security -
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Free accessSpringer Verlag | 2006|Keywords: Security Analysis, Systems and Data Security -
Adaptive Security for the Additive-Sharing Based Proactive RSA
Springer Verlag | 2001|Keywords: Security Parameter, Adaptive Security -
Firm Grip Handshakes: A Tool for Bidirectional Vouching
Springer Verlag | 2012|Keywords: Transport Layer Security, Systems and Data Security -
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems
Springer Verlag | 2012|Keywords: forward security, Systems and Data Security -
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
Springer Verlag | 2008|Keywords: security analysis, Systems and Data Security -
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
Sequential Aggregate Signatures Made Shorter
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers
Springer Verlag | 2005|Keywords: Security Property, Security Parameter -
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Springer Verlag | 2020|Keywords: Systems and Data Security -
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
Springer Verlag | 2020|Keywords: Systems and Data Security -
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings
Springer Verlag | 2021|Keywords: Adaptive security, Chosen-ciphertext security, Mobile and Network Security -
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Hard Invalidation of Electronic Signatures
Springer Verlag | 2015|Keywords: Systems and Data Security -
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Springer Verlag | 2016|Keywords: Systems and Data Security -
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs
Springer Verlag | 2018|Keywords: Systems and Data Security -
Privacy Threats in E-Shopping (Position Paper)
Springer Verlag | 2016|Keywords: Systems and Data Security -
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
Springer Verlag | 2014|Keywords: Systems and Data Security -
Group Encryption: Non-interactive Realization in the Standard Model
Free accessSpringer Verlag | 2009|Keywords: provable security -
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Springer Verlag | 2013|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.