Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Sleight of hand [embedded system security]
IET Digital Library Archive | 2004|Keywords: data security, telecommunication security, end customer security, security of data, embedded system security -
A security mechanism for remote configuration of substation communication
IET Digital Library Archive | 2006|Keywords: security mechanism, security communication channel, telecommunication security, information security -
Advanced small-signal security assessment tools for power systems
IET Digital Library Archive | 2006|Keywords: voltage security assessment, dynamic security assessment, transient security assessment, power system security, small-signal security assessment -
Packets in peril [voice over IP security issues]
IET Digital Library Archive | 2004|Keywords: voice over IP security, security threats, telecommunication security, security of data -
Technical and administrative cyber security issues with implementation of a SCADA security upgrade
IET Digital Library Archive | 2005|Keywords: technical cyber security issues, administrative cyber security issues, security of data, SCADA security upgrade -
The security deployment of early IMS
IET Digital Library Archive | 2005|Keywords: security deployment, 3GPP TS 33.203 security features, roaming security, signaling security, NAT security, interworking security, telecommunication security -
Analyse of the application schemes for the wireless network security
IET Digital Library Archive | 2006|Keywords: telecommunication security, wireless network security -
Providing safety, security and integrity: technology for civilian coastal radar
IET Digital Library Archive | 2006|Keywords: safety, security, marine safety, national security -
Security techniques
IET Digital Library Archive | 1995|Keywords: telecommunications security, security mechanisms, security techniques, security of data -
The challenge of keeping applications secure
IET Digital Library Archive | 2004|Keywords: telecommunication security, security loopholes, 3G security -
Welcome to the wireless world
IET Digital Library Archive | 2006|Keywords: security, telecommunication security -
A review of Bluetooth security in the automotive environment
IET Digital Library Archive | 2004|Keywords: Bluetooth security, security risks, security of data, telecommunication security -
Network characteristics to support end-to-end security between mobile devices
IET Digital Library Archive | 2005|Keywords: telecommunication security, end-to-end security -
Can GIS switchgear keep what it promises? Requirements towards an up to date gas insulated switchgear design and their realization
IET Digital Library Archive | 2006|Keywords: safety, security, power system security -
Is RFID automating crime?
IET Digital Library Archive | 2006|Keywords: RFID security, security of data -
Is GSM still secure?
IET Digital Library Archive | 2004|Keywords: telecommunication security, security evolution -
EMC and the safety case
IET Digital Library Archive | 2003|Keywords: safety, EMC safety requirements, safety risk, safety case -
UMTS security
IET Digital Library Archive | 2002|Keywords: UMTS security, telecommunication security, security of data -
Managing contractor safety the contractor's perspective
IET Digital Library Archive | 2004|Keywords: occupational safety, health and safety training, safety during work, electrical safety, contractor safety management, health and safety legislation -
Functional safety in application of programmable devices in power system protection and automation
IET Digital Library Archive | 2004|Keywords: safety integrity levels, functional safety, health and safety executive, health and safety -
Modified Chang-Hwang-Wu access control scheme
IET Digital Library Archive | 1993|Keywords: security classes, security levels -
Work of the regional electricity companies to provide a safer substation environment for both operators and public. Introduction and Part 1: Performance - “the good, the bad and the ugly”
IET Digital Library Archive | 1997|Keywords: safety, public safety, design safety, operator safety -
Existing wireless network security mechanisms and their limitations for ad hoc networks
IET Digital Library Archive | 2006|Keywords: telecommunication security, wireless network security mechanism -
Network security - who's responsible? [Ethernet in plant floor automation applications]
IET Digital Library Archive | 2004|Keywords: network security, safety systems, security risks, telecommunication security -
Secure and efficient web metering scheme
IET Digital Library Archive | 2005|Keywords: telecommunication security, security of data -
Overview of IEC 61508. Design of electrical/electronic/programmable electronic safety-related systems
IET Digital Library Archive | 2000|Keywords: safety-critical software, electrical safety-related systems, safety systems, safety-related applications, electronic safety-related systems -
Experiences in securing a regional telemetry system
IET Digital Library Archive | 2005|Keywords: information security strategy, security of data -
Transmission network expansion planning with security constraints
IET Digital Library Archive | 2005|Keywords: security constraint, power system security -
RFID - a new solution technology for security problems
IET Digital Library Archive | 1995|Keywords: security problems, security arena, security -
Effectiveness of different design solutions to control internal faults in MV switchgear
IET Digital Library Archive | 1997|Keywords: safety, public safety, personnel safety, safety standards -
Novel m-commerce security protocol for third generation mobile networks
IET Digital Library Archive | 2003|Keywords: m-commerce security protocol, security threats, telecommunication security -
Managing contractor health & safety
IET Digital Library Archive | 2005|Keywords: occupational safety, health & safety -
Digital signature scheme based on error-correcting codes
IET Digital Library Archive | 1990|Keywords: data security, security -
VoIP insecurity
IET Digital Library Archive | 2006|Keywords: security of data, telecommunication security, proactive security strategy -
Legal requirements
IET Digital Library Archive | 1998|Keywords: safety, Health and Safety at Work Act, electrical installation safety -
Smart card based end-to-end security for TETRA radio networks
IET Digital Library Archive | 2003|Keywords: security services, telecommunication security, smart card based end-to-end security -
Securing next generation mobile networks
IET Digital Library Archive | 2004|Keywords: network security, mobile network security architecture, security threats, telecommunication security -
Machine safety using a detachable fieldbus connection
IET Digital Library Archive | 2004|Keywords: safety systems, programmable safety system, Pilz safety controller, machine safety -
Real time data transmission over GSM voice channel for secure voice & data applications
IET Digital Library Archive | 2004|Keywords: telecommunication security, data communication security -
Towards safer electrical installations - learning the lessons. Legal requirements
IET Digital Library Archive | 1999|Keywords: safety, Health and Safety at Work Act, electrical installations safety -
Securing airwave's future
IET Digital Library Archive | 2004|Keywords: safety, telecommunication security, airwave security, public safety community -
Gambling on chips [radiofrequency identification chips - security]
IET Digital Library Archive | 2006|Keywords: RFID security, security of data -
Thwarting VoIP threats
IET Digital Library Archive | 2005|Keywords: telecommunication security, VoIP security threat thwarting -
Novel authenticated key management framework for ad hoc network security
IET Digital Library Archive | 2006|Keywords: ad hoc network security, telecommunication security -
High-security asynchronous circuit implementation of AES
IET Digital Library Archive | 2006|Keywords: highly balanced security latches, high-security asynchronous circuit -
New applications of p-subgroup problems in broadcast encryption services
IET Digital Library Archive | 2006|Keywords: security, telecommunication security -
Extending 2G end-to-end security solutions to 3G networks
IET Digital Library Archive | 2003|Keywords: end-to-end security solutions, telecommunication security -
P2P networking comes of age
IET Digital Library Archive | 2006|Keywords: security of data, telecommunication security, homeland security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.