Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Improved group signature scheme based on discrete logarithm problem
IET Digital Library Archive | 1999|Keywords: security -
Using four-prime RSA in which some of the bits are specified
IET Digital Library Archive | 1994|Keywords: security level -
Dynamical cryptography based on synchronised chaotic systems
IET Digital Library Archive | 1999|Keywords: security communication -
ID-based signatures from pairingson elliptic curves
IET Digital Library Archive | 2002|Keywords: security -
Hiding data in multitone images for data communications
IET Digital Library Archive | 2004|Keywords: security of data, data security, telecommunication security -
A new ID-based blind signature from bilinear pairings
IET Digital Library Archive | 2006|Keywords: e-commerce security, telecommunication security -
Efficient blind signature scheme based on quadratic residues
IET Digital Library Archive | 1996|Keywords: security -
Efficient one-time proxy signatures
IET Digital Library Archive | 2005|Keywords: extended security requirements -
Data hiding technologies for digital radiography
IET Digital Library Archive | 2005|Keywords: security of data, security -
Digital signature schemes based on factoring and discrete logarithms
IET Digital Library Archive | 2002|Keywords: security -
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure
IET Digital Library Archive | 2003|Keywords: software security, security of data -
The selection, installation and operation of CAD systems
IET Digital Library Archive | 1984|Keywords: security -
View-centric reasoning for Linda and Tuple Space computation
IET Digital Library Archive | 2003|Keywords: safety -
A cost-effective parallel solution for real-time dynamic security assessment
IET Digital Library Archive | 2003|Keywords: power system security, real-time dynamic security assessment -
Public-key cryptosystem design based on factoring and discrete logarithms
IET Digital Library Archive | 1994|Keywords: security parameters -
Fortuna: cryptographically secure pseudo-random number generation in software and hardware
IET Digital Library Archive | 2006|Keywords: telecommunication security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.