Year of publication
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
1–20 of 26,615 hits
Sort by:
Sort by:
-
π-Cipher: Authenticated Encryption for Big Data
British Library Conference Proceedings | 2014|Keywords: Computer security -
μTSS - A Simplified Trusted Software Stack
British Library Conference Proceedings | 2010|Keywords: Computer security -
μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks
British Library Conference Proceedings | 2013|Keywords: Computer security -
Zugriffsschutz ist unzureichend. Datensicherheit in verteilten Systemen
Tema Archive | 1990|Keywords: NCSC (NATIONAL COMPUTER SECURITY ...) -
Zugriffskontrolle bei Datenbanken
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 1993|Keywords: Computer security -
ZTDMA: A Multi-zones and Multi-objectives Channel Allocation Protocol Based on TOA Real-Time Geolocation System
British Library Conference Proceedings | 2014|Keywords: Computer security -
ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices
TIBKAT | 2022|Keywords: Computer security -
Zone-Based Synthesis of Strict 2-Phase Fault Recovery
British Library Conference Proceedings | 2013|Keywords: Computer security -
zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs
TIBKAT | 2023|Keywords: Computer security -
Zero-Sum Games of Deception
British Library Conference Proceedings | 2010|Keywords: Computer security -
Zero-Knowledge Protocols for the McEliece Encryption
British Library Conference Proceedings | 2012|Keywords: Computer security -
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge
British Library Conference Proceedings | 2009|Keywords: Computer security -
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR
TIBKAT | 2020|Keywords: Computer security -
Zero-knowledge proofs of decision power: new protocols and optimal round-complexity
British Library Conference Proceedings | 1997|Keywords: computer security -
Zero-knowledge proofs of computational power in the shared string model
British Library Conference Proceedings | 1995|Keywords: computer security research
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.