Year of publication
Type of media
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Limits of Provable Security for Homomorphic Encryption
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Towards a Maturity Model for Crypto-Agility Assessment
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Whiteboxgrind — Automated Analysis of Whitebox Cryptography
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archive | 2013|Keywords: passive Sicherheit, aktive Sicherheit -
Bewertung der Sicherheit von Straßentunneln - Überprüfung der Annahmen und Parameter für Risikoanalysen
Free accessTIBKAT | 2022|Keywords: Sicherheit -
SCADA Radio Blackbox Reverse Engineering
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Money Transfer on Transaction Signature-Based Ledger
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.