Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Security from Legacy Wireless Systems to 5G Networks
Wiley | 2024|Keywords: security attacks, security services, wireless network security, wireless security architectures -
Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges
Elsevier | 2022|Keywords: IoT security, IoT ecosystem security, Security requirements -
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
Online Contents | 2021|Keywords: Security protocol, Information security -
Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks
Elsevier | 2017|Keywords: Security, Security keys -
A sentence-level text adversarial attack algorithm against IIoT based smart grid
Elsevier | 2021|Keywords: IIoT security, Smart grid security -
ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)
Online Contents | 2020|Keywords: Data security, Navigation and information security -
Performance Evaluation of a Hybrid Vehicle and Sensor Network to Prevent Traffic Accidents
TIBKAT | 2020|Keywords: National security, Computer security -
A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment
Online Contents | 2016|Keywords: Vehicular security system, Security authentication, IoT security -
Security challenges with network functions virtualization
Elsevier | 2016|Keywords: Network security, Security threats -
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
Online Contents | 2010|Keywords: security policy, security mangement, network security, security modeling -
Dataset to "Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things"
DataCite | 2021|Keywords: network security, security configuration -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessIET | 2019|Keywords: system security, physical layer security research, random mobile user physical layer security model, security of data, telecommunication security, artificial noise security scheme, physical layer security performance, physical layer security enhancing -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Keywords: National security, Computer security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Applications and challenges of maintenance and safety engineering in industry 4.0
TIBKAT | 2020|Keywords: Industrial safety -
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Elsevier | 2015|Keywords: Security Attacks -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Keywords: National security, Computer security -
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Online Contents | 2015|Keywords: Security zones, Mobile security -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Keywords: National security, Computer security -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Probabilistic yoking proofs for large scale IoT systems
Elsevier | 2015|Keywords: RFID security, IoT security -
Cloud security: Emerging threats and current solutions
Elsevier | 2016|Keywords: Cloud computing security, Security techniques -
On usage control for GRID systems
Elsevier | 2009|Keywords: Security policies, Grid security, Distributed systems security -
Simulation of transaction malleability attack for blockchain-based e-Voting
Elsevier | 2020|Keywords: Blockchain Security, Security Evaluation -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessWiley | 2019|Keywords: physical layer security research, artificial noise security scheme, physical layer security performance, security of data, system security, random mobile user physical layer security model, telecommunication security, physical layer security enhancing -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Keywords: Safety PLC, Safety integrity, Safety function -
An empirical study on security expert ecosystem in the future IoT service environment
Elsevier | 2016|Keywords: Security ecosystem, Security expert -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
Worldwide cyber security
British Library Conference Proceedings | 2012|Keywords: Cyber security, Security -
Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework
Elsevier | 2021|Keywords: IoT security, Security framework, IoT security requirements, IoT security best practices -
Analysis and Security Evaluation of Security Threat on Broadcasting Service
Online Contents | 2017|Keywords: Security, Security evaluation -
Multimodal layer surveillance map based on anomaly detection using multi‐agents for smart city security
Free accessWiley | 2022|Keywords: smart‐city security, security robot -
Provably Secure Higher-Order Masking of AES
Tema Archive | 2011|Keywords: physikalische Security, Sicherheit, beweisbare Sicherheit -
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archive | 2007|Keywords: Sicherheit, beweisbare Sicherheit -
Understanding and overcoming cyber security anti-patterns
Elsevier | 2012|Keywords: Cyber security, Security controls, Security governance -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Software Defined Mobile Network Security
Wiley | 2015|Keywords: Security, Mobile network security, Security architecture -
Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance
Springer Verlag | 2021|Keywords: Cloud security model, Cloud security requirements, Cloud security threats, Cloud security vulnerabilities, Cloud security solution -
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data
Elsevier | 2021|Keywords: Cloud security, Forward security -
Continuity in Wireless Video Security System-Based Physical Security Services
Online Contents | 2013|Keywords: Security policy, Security service, Physical security, Video security system -
Scalable RFID security framework and protocol supporting Internet of Things
Elsevier | 2014|Keywords: Security protocol, Security framework -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security -
Security analysis of socio-technical physical systems
Elsevier | 2015|Keywords: Security assessment, Security model -
SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks
Elsevier | 2014|Keywords: Security middleware, Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.