Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Keywords: National security, Computer security -
Only play in your comfort zone: interaction methods for improving security awareness on mobile devices
Online Contents | 2015|Keywords: Security zones, Mobile security -
When Agile Security Meets 5G
Free accessDOAJ | 2020|Keywords: 5G security, agile security, cloud security, security risk management -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Keywords: National security, Computer security -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Probabilistic yoking proofs for large scale IoT systems
Elsevier | 2015|Keywords: RFID security, IoT security -
The pluralization of policing and the rise of private policing in China
Online Contents | 2009|Keywords: Security Service, Security Guard, Private Security, Public Security -
Cloud security: Emerging threats and current solutions
Elsevier | 2016|Keywords: Cloud computing security, Security techniques -
On usage control for GRID systems
Elsevier | 2009|Keywords: Security policies, Grid security, Distributed systems security -
Pflicht zur Sicherheit : öffentlich-rechtliche Anforderungen an private Großveranstalter und die Legalisierungswirkung von Genehmigungen
GWLB - Gottfried Wilhelm Leibniz Bibliothek | 2019|Keywords: Sicherheit und Ordnung, Sicherheit -
Simulation of transaction malleability attack for blockchain-based e-Voting
Elsevier | 2020|Keywords: Blockchain Security, Security Evaluation -
Diagnostics of an output interface of a safety-related system with safety PLC
Online Contents | 2017|Keywords: Safety PLC, Safety integrity, Safety function -
Analysis of the physical layer security enhancing of wireless communication system under the random mobile
Free accessWiley | 2019|Keywords: physical layer security research, artificial noise security scheme, physical layer security performance, security of data, system security, random mobile user physical layer security model, telecommunication security, physical layer security enhancing -
Pflicht zur Sicherheit : öffentlich-rechtliche Anforderungen an private Großveranstalter und die Legalisierungswirkung von Genehmigungen
TIBKAT | 2019|Keywords: Sicherheit und Ordnung, Sicherheit -
Citizen confidence in private security guards in Portugal
Online Contents | 2015|Keywords: private security, private security guards, Citizen confidence in private security guards, perceptions of private security guards, Security services -
War and other insecurities in East Asia: what the security studies field does and does not tell us
Taylor & Francis Verlag | 2009|Keywords: security, security studies, non-traditional security -
The private security complex and its regulation in Africa: select examples from the continent
Taylor & Francis Verlag | 2017|Keywords: Private security, state security -
An empirical study on security expert ecosystem in the future IoT service environment
Elsevier | 2016|Keywords: Security ecosystem, Security expert -
Security‐as‐a‐Service (SECaaS) in the Cloud
Wiley | 2019|Keywords: Security‐as‐a‐service, next generation security services, Cloud computing security, managed security services -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Crashes on and Near College Campuses: A Comparative Analysis of Pedestrian and Bicyclist Safety
Taylor & Francis Verlag | 2014|Keywords: pedestrian safety, bicycle safety -
Worldwide cyber security
British Library Conference Proceedings | 2012|Keywords: Cyber security, Security -
Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework
Elsevier | 2021|Keywords: IoT security, Security framework, IoT security requirements, IoT security best practices -
Still agreeing to disagree: international security and constructive ambiguity
Free accessTaylor & Francis Verlag | 2021|Keywords: UN Security Council resolutions, security -
Analysis and Security Evaluation of Security Threat on Broadcasting Service
Online Contents | 2017|Keywords: Security, Security evaluation -
The Scandinavian Approach to Private Maritime Security-A Regulatory Façade?
Online Contents | 2015|Keywords: private security, National security, Security management, maritime security, Security services -
Regime security first: explaining Vietnam's security policies towards the United States and China (1992–2012)
Taylor & Francis Verlag | 2015|Keywords: Vietnam's security policy, regime security -
Multimodal layer surveillance map based on anomaly detection using multi‐agents for smart city security
Free accessWiley | 2022|Keywords: smart‐city security, security robot -
Provably Secure Higher-Order Masking of AES
Tema Archive | 2011|Keywords: physikalische Security, Sicherheit, beweisbare Sicherheit -
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archive | 2007|Keywords: Sicherheit, beweisbare Sicherheit -
Private security services regulations in the United States today
Taylor & Francis Verlag | 2017|Keywords: private security, security guards, security consultants -
Understanding and overcoming cyber security anti-patterns
Elsevier | 2012|Keywords: Cyber security, Security controls, Security governance -
Understanding the effectiveness of investments in irrigation system modernization: evidence from Madhya Pradesh, India
Taylor & Francis Verlag | 2019|Keywords: Water security, food security -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
„Dateneigentum“ – Schutz durch Immaterialgüterrecht?
DeGruyter | 2016|Keywords: Daten und Sicherheit -
Factors influencing the performance of safety programmes in the Ghanaian construction industry
Free accessDOAJ | 2018|Keywords: Safety performance, safety programmes, safety elements -
Software Defined Mobile Network Security
Wiley | 2015|Keywords: Security, Mobile network security, Security architecture -
Top Threats to Cloud: A Three-Dimensional Model of Cloud Security Assurance
Springer Verlag | 2021|Keywords: Cloud security model, Cloud security requirements, Cloud security threats, Cloud security vulnerabilities, Cloud security solution -
A guiding framework for enhancing database security in state-owned universities in Zimbabwe
Taylor & Francis Verlag | 2022|Keywords: database security, security vulnerabilities, security controls -
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data
Elsevier | 2021|Keywords: Cloud security, Forward security -
The intersection of social protection and mobilities: a move towards a ‘Practical Utopia’ research agenda
Free accessTaylor & Francis Verlag | 2018|Keywords: Social security, migration-security nexus -
Continuity in Wireless Video Security System-Based Physical Security Services
Online Contents | 2013|Keywords: Security policy, Security service, Physical security, Video security system -
Scalable RFID security framework and protocol supporting Internet of Things
Elsevier | 2014|Keywords: Security protocol, Security framework -
The Arctic as a regional security complex
Taylor & Francis Verlag | 2024|Keywords: regional security complex, security -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.