Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Insider-Proof Encryption with Applications for Quantum Key Distribution
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Perfectly-Secure MPC Tolerating General Adversaries
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
A machine learning low‐dropout regulator‐assisted differential power analysis attack countermeasure with voltage scaling
Wiley | 2023|Keywords: hardware security, security analysis -
An online power system static security assessment module using multi-layer perceptron and radial basis function network
Elsevier | 2015|Keywords: Power system security, Security assessment -
Broadcast (and Round) Efficient Verifiable Secret Sharing
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Superposition Attacks on Cryptographic Protocols
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
Springer Verlag | 2013|Keywords: CoAP security, end-to-end application-layer security, message security, granular security, Systems and Data Security -
Rice security in Southeast Asia: beggar thy neighbor or cooperation?
Taylor & Francis Verlag | 2013|Keywords: nontraditional security, food security -
Indian Ocean maritime security: energy, environmental and climate challenges
Taylor & Francis Verlag | 2010|Keywords: maritime security, non-traditional security -
Emerging topics in defending networked systems
Elsevier | 2021|Keywords: Network security, Information security -
Consolidated Identity Management System for secure mobile cloud computing
Elsevier | 2014|Keywords: Cloud computing security, Security attacks -
Multi-objective evolutionary approach to select security solutions
Free accessIET | 2017|Keywords: security issues, optimised security method, efficient security solutions, security methods -
Sub-Saharan migrants ‘in transit’: intersections between mobility and immobility and the production of (in)securities
Taylor & Francis Verlag | 2021|Keywords: security, critical security studies -
Research and Design of the Security Area Classification Model of Electric Power Information System
National licenceTrans Tech Publications | 2011|Keywords: Information Security, Network Business Security, Security Area Classification, Electric Power Information Security -
Steady-state security assessment in distribution systems with high penetration of distributed energy resources
Elsevier | 2021|Keywords: Steady-state security region, Security assessment -
IT-Sicherheit – Kein Thema nur für Betreiber Kritischer Infrastrukturen
DeGruyter | 2017|Keywords: Daten und Sicherheit -
Die informationelle Selbstbestimmung – umzingelt von Freunden?
DeGruyter | 2017|Keywords: Daten und Sicherheit -
Datentreuhändermodelle – Sicherheit vor Herausgabeverlangen US-amerikanischer Behörden und Gerichte?
DeGruyter | 2017|Keywords: Daten und Sicherheit -
Contractors as a Second Best Option: The Italian Hybrid Approach to Maritime Security
Taylor & Francis Verlag | 2015|Keywords: maritime security, Private Military and Security Companies (PSMC), security commercialization -
Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
An evaluation of videogame network architecture performance and security
Elsevier | 2021|Keywords: Network security, Videogame security -
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Free accessDOAJ | 2017|Keywords: multimedia security; security; aes; rc4 -
Projekt SUBI: Sicherheit von Untergrundspeichern bei zyklischer Belastung: Funktionalität und Integrität von Speichern und Bohrungen
Free accessTIBKAT | 2020|Keywords: Sicherheit -
Technik-Verantwortung : Sicherheitspflichten der Ingenieure, Meister und Fachkräfte - Organisation und Aufsicht durch Management und Führungskräfte
TIBKAT | 2022|Keywords: Sicherheit, Technische Sicherheit -
Requirements engineering for safety-critical systems
TIBKAT | 2021|Keywords: System safety, Industrial safety -
Communications Security in Embedded Systems
Wiley | 2013|Keywords: Security services, Security implementation, Security techniques, Security attacks -
Research on Database Security Technology
Springer Verlag | 2012|Keywords: Database security, Security system, Security technology, Security agreement -
Improving cloud network security using the Tree-Rule firewall
Elsevier | 2013|Keywords: Network security, Cloud security -
Secret Sharing
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
3. Fachsymposium zum Terroranschlag auf dem Berliner Breitscheidplatz : Sicherheit von Großveranstaltungen - Veranstaltungsschutz im Kontext abstrakter Bedrohungslagen : Fachtagung des Fachbereichs Polizei und Sicherheitsmanagement der Hochschule für Wirtschaft und Recht (HWR) Berlin und der Senatsverwaltung für Inneres und Sport Berlin am 19. Dezember 2019 in Berlin
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2020|Keywords: Sicherheit -
IT-Sicherheitsmanagement nach der neuen ISO 27001 : ISMS, Risiken, Kennziffern, Controls
TIBKAT | 2020|Keywords: Systems and Data Security, Computer security -
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Free accessDOAJ | 2017|Keywords: Multimedia Security; Security; AES; RC4 -
PICADOR: End-to-end encrypted Publish–Subscribe information distribution with proxy re-encryption
Elsevier | 2016|Keywords: Security -
Integration of the OAuth and Web Service family security standards
Elsevier | 2013|Keywords: Security Token Service, WS-Security -
Understanding the Chinese Data Security Law
Springer Verlag | 2021|Keywords: Data security administration, Data security review, Data security obligations, Security -
Review of Cyber Security for Power Trading and Communication Systems
Springer Verlag | 2022|Keywords: Cyber security, Power trading security, Security and performance, Security technology, Network security, Systems and Data Security -
Data-Driven Security for Smart City Systems: Carving a Trail
Free accessDOAJ | 2020|Keywords: data-driven security, security protection techniques, security policies, security management -
Security cooperation in the Indo-Pacific: non-traditional security as a catalyst
Taylor & Francis Verlag | 2014|Keywords: non-traditional security, security cooperation -
(Re)Establishing Control? Flag State Regulation of Antipiracy PMSCs
Taylor & Francis Verlag | 2015|Keywords: maritime security governance, Private Military and Security Companies, privatization of security -
Security officers’ attitudes towards training and their work environment
Online Contents | 2016|Keywords: Security management, Security personnel -
Spatial pattern of climate change and farmer–herder conflict vulnerabilities in Nigeria
Online Contents | 2020|Keywords: Environmental security, Climate change and security, Climate security vulnerability model -
Recent Advances in Cryptography and Network Security
Free accessTIBKAT | 2018|Keywords: Computer security -
Safety risk management of underground engineering in China: Progress, challenges and strategies
Free accessDOAJ | 2016|Keywords: Safety risk management, Safety behaviors, Safety challenges, Safety progress and strategies
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.