Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Jitter Estimation with High Accuracy for Oscillator-Based TRNGs
Springer Verlag | 2019|Keywords: Systems and Data Security -
Boolean Function Representation of S-Boxes and Boolean Permutations
Springer Verlag | 2016|Keywords: Systems and Data Security -
Erratum: A Rapid and Scalable Method for Android Application Repackaging Detection
Springer Verlag | 2015|Keywords: Systems and Data Security -
Correlation Immunity of Boolean Functions
Springer Verlag | 2016|Keywords: Systems and Data Security -
The Symmetric Property of Boolean Functions
Springer Verlag | 2016|Keywords: Systems and Data Security -
Algebraic Immunity of Boolean Functions
Springer Verlag | 2016|Keywords: Systems and Data Security -
Independence of Boolean Functions of Their Variables
Springer Verlag | 2016|Keywords: Systems and Data Security -
Cryptographic Applications of Boolean Functions
Springer Verlag | 2016|Keywords: Systems and Data Security -
Type-Based Analysis of Protected Storage in the TPM
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha
Springer Verlag | 2013|Keywords: Systems and Data Security -
An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators
Springer Verlag | 2018|Keywords: Systems and Data Security -
A Rapid and Scalable Method for Android Application Repackaging Detection
Springer Verlag | 2015|Keywords: Systems and Data Security -
Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model
Springer Verlag | 2013|Keywords: Systems and Data Security -
Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware
Springer Verlag | 2015|Keywords: Systems and Data Security -
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round
Springer Verlag | 2017|Keywords: Systems and Data Security -
OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Near Collision Attack on the Grain v1 Stream Cipher
Springer Verlag | 2014|Keywords: Systems and Data Security -
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard
Springer Verlag | 2009|Keywords: Systems and Data Security -
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model
Springer Verlag | 2014|Keywords: Systems and Data Security -
TULAM: trajectory-user linking via attention mechanism
Springer Verlag | 2024|Keywords: data security and privacy -
Automatic Polymorphic Exploit Generation for Software Vulnerabilities
Springer Verlag | 2013|Keywords: Systems and Data Security -
On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes
Springer Verlag | 2015|Keywords: Systems and Data Security -
Nonlinearity Measures of Boolean Functions
Springer Verlag | 2016|Keywords: Systems and Data Security -
On the Security of an Efficient Attribute-Based Signature
Springer Verlag | 2013|Keywords: Systems and Data Security -
On the Correctness of an Approach against Side-Channel Attacks
Springer Verlag | 2009|Keywords: Systems and Data Security -
Revisiting Node Injection of P2P Botnet
Springer Verlag | 2014|Keywords: Systems and Data Security -
Security patterns: a method for constructing secure and efficient inter-company coordination systems
Tema Archive | 2004|Keywords: Datensicherheit -
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone
Springer Verlag | 2015|Keywords: Systems and Data Security -
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash
Springer Verlag | 2016|Keywords: Systems and Data Security -
Operating System Security Policy Hardening via Capability Dependency Graphs
Springer Verlag | 2015|Keywords: Systems and Data Security -
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures
Springer Verlag | 2013|Keywords: Systems and Data Security -
Linear Cryptanalysis of FASER128/256 and TriviA-ck
Springer Verlag | 2014|Keywords: Systems and Data Security -
Boolean Functions and Their Walsh Transforms
Springer Verlag | 2016|Keywords: Systems and Data Security -
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost
Springer Verlag | 2011|Keywords: Systems and Data Security -
Reconstructing a Packed DLL Binary for Static Analysis
Springer Verlag | 2009|Keywords: Systems and Data Security -
FAN: A Lightweight Authenticated Cryptographic Algorithm
Springer Verlag | 2021|Keywords: Systems and Data Security -
Strengthening Spread Spectrum Watermarking Security via Key Controlled Wavelet Filter
Springer Verlag | 2015|Keywords: Systems and Data Security -
Expressive and Secure Searchable Encryption in the Public Key Setting
Springer Verlag | 2014|Keywords: Systems and Data Security -
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS
Springer Verlag | 2014|Keywords: Systems and Data Security -
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking
Free access(Extended Abstract)Springer Verlag | 2013|Keywords: Systems and Data Security -
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System
Springer Verlag | 2018|Keywords: Systems and Data Security -
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Z_{pq}$$\end{document}
Springer Verlag | 2014|Keywords: Systems and Data Security -
How to Choose Interesting Points for Template Attacks More Effectively?
Springer Verlag | 2015|Keywords: Systems and Data Security -
UC-RBAC: A Usage Constrained Role-Based Access Control Model
Springer Verlag | 2003|Keywords: Systems and Data Security -
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing
Springer Verlag | 2013|Keywords: Systems and Data Security -
Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform
Springer Verlag | 2013|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.