Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: DATENSICHERHEIT
Search without synonyms: keywords:(DATENSICHERHEIT)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
3-Message Zero Knowledge Against Human Ignorance
Springer Verlag | 2016|Keywords: Systems and Data Security -
3rd int. conf. on very large data bases, proc., tokyo, j., 6-8 oct., 1977
Tema Archive | 1977Keywords: DATENSICHERUNG -
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors
Springer Verlag | 2013|Keywords: Systems and Data Security -
26th annual sympos. on foundations of computer science, Portland, USA, Oct. 21-23, 1985
Tema Archive | 1985Keywords: DATENSICHERUNG -
2010 Census: Bureau Needs to Specify How It Will Assess Coverage Follow-Up Techniques and When It Will Produce Coverage Measurement Results
NTIS | 2008Keywords: Data integrity -
A 2-Competitive Largest Job on Least Loaded Machine Online Algorithm Based on the Multi List Scheduling Model
Springer Verlag | 2022|Keywords: Systems and Data Security -
A Behavioral Study of Some Widely Employed Partitional and Model-Based Clustering Algorithms and Their Hybridizations
Springer Verlag | 2016|Keywords: Systems and Data Security -
A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and Events
Springer Verlag | 2014|Keywords: Systems and Data Security -
A Blind Signature Scheme Based on Bilinear Pairings
Springer Verlag | 2022|Keywords: Systems and Data Security -
A Blockchain-Empowered Arbitrable Multimedia Data Auditing Scheme in IoT Cloud Computing
Free accessDOAJ | 2022|Keywords: data integrity -
A Bounding Technique for Probabilistic PERT
Springer Verlag | 2019|Keywords: Systems and Data Security -
About the Efficiency of Malware Monitoring via Server-Side Honeypots
Springer Verlag | 2016|Keywords: Systems and Data Security -
A Brief Survey on the Contribution of Mirka Miller to the Security of Statistical Databases
Springer Verlag | 2018|Keywords: Data security -
Abstract Interpretation: From 0, 1, to \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\infty $$\end{document}
Springer Verlag | 2023|Keywords: Systems and Data Security -
Abuse-Free Optimistic Contract Signing
Free accessSpringer Verlag | 1999|Keywords: Systems and Data Security -
A Byte-Based Guess and Determine Attack on SOSEMANUK
Free accessSpringer Verlag | 2010|Keywords: Systems and Data Security -
Academic Dashboard—Prediction of Institutional Student Dropout Numbers Using a Naïve Bayesian Algorithm
Springer Verlag | 2017|Keywords: Systems and Data Security -
A Case Study on Data Protection for a Cloud- and AI-Based Homecare Medical Device
Springer Verlag | 2023|Keywords: Data Security -
A CCA-Secure Cryptosystem Using Massive MIMO Channels
Springer Verlag | 2017|Keywords: Systems and Data Security -
Accelerated evaluation of modular reduction
National licenceSpringer Verlag | 1997|Keywords: Data Security -
Accelerating Sorting of Fully Homomorphic Encrypted Data
Springer Verlag | 2013|Keywords: Systems and Data Security -
Access Control Encryption: Enforcing Information Flow with Cryptography
Springer Verlag | 2016|Keywords: Systems and Data Security -
Access to Sensitive Data: Satisfying Objectives Rather than Constraints
Free accessDOAJ | 2014|Keywords: data security -
Accuracy, Integrity, and Security in Computerized Vote-Tallying
NTIS | 1988|Keywords: Data integrity -
Accurate Decision Tree with Cost Constraints
Springer Verlag | 2018|Keywords: Systems and Data Security -
Accurate Prediction of NBA Players’ Lifespan with Big Sports Data
Springer Verlag | 2021|Keywords: Systems and Data Security -
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
Springer Verlag | 2007|Keywords: Systems and Data Security -
Achievable error exponents for the private fingerprinting game
Tema Archive | 2007|Keywords: Datensicherheit -
Achieving integrity in methods and language
IET Digital Library Archive | 1995|Keywords: data integrity -
A Closer Look at Anonymity and Robustness in Encryption Schemes
Free accessSpringer Verlag | 2010|Keywords: Systems and Data Security -
A Cloud Fuzzy Production Inventory Model of Preservation Technology Affected Deteriorating Items with Stock and Demand Sensitive Production Rate
Springer Verlag | 2023|Keywords: Systems and Data Security -
A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
A Clustering Algorithm for the DAP Placement Problem in Smart Grid
Springer Verlag | 2018|Keywords: Systems and Data Security -
A code reconfiguration design for two dimensional OCDMA system to enhance security
Tema Archive | 2007|Keywords: Datensicherheit -
A Coding-Theoretic Approach to Recovering Noisy RSA Keys
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
A Comparative Study of Pre-trained Gene Embeddings for COVID-19 mRNA Vaccine Degradation Prediction
Springer Verlag | 2022|Keywords: Systems and Data Security -
A Comparative Study of Random Forest Regression for Predicting House Prices Using
Free accessSpringer Verlag | 2024|Keywords: Systems and Data Security -
A Comparative Study on Decision Support Approaches Under Uncertainty
Springer Verlag | 2019|Keywords: Systems and Data Security -
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
Springer Verlag | 2014|Keywords: Systems and Data Security -
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers
Springer Verlag | 2013|Keywords: Systems and Data Security -
A Comprehensive Analysis of Regression Test Case Assessment Using Humpback Whale Optimization
Springer Verlag | 2024|Keywords: Systems and Data Security -
A Comprehensive Architecture for Correlation Analysis to Improve the Performance of Security Operation Center
Springer Verlag | 2017|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.