Year of publication
Type of media
Source
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Strategic Antieavesdropping Game for Physical Layer Security in Wireless Cooperative Networks
Online Contents | 2017|Keywords: Security, Communication system security, physical layer security -
Electrical Safety Workshop Issues Call for Papers
Online Contents | 2016Keywords: Safety and security measures -
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
Online Contents | 2008|Keywords: Concrete security -
On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation
Online Contents | 2017|Keywords: Security, Physical layer security, Communication system security -
Secure Multiuser MIMO Downlink Transmission Via Precoding-Aided Spatial Modulation
Online Contents | 2016|Keywords: Security, physical layer security -
Adaptive Secure Transmission for Physical Layer Security in Cooperative Wireless Networks
Online Contents | 2017|Keywords: Security, security protection, Physical layer security -
IT-Sicherheit in Stromnetzen aus Sicht eines Geräteherstellers
Tema Archive | 2014|Keywords: IT-Sicherheit -
Preparation of Monodisperse Silica Nanoparticles via Controlling the Interphase of Two-Phase Synthesis for Optical Anticounterfeiting Materials
Online Contents | 2019|Keywords: Security features -
A trust-based security environment in MANET: definition and performance evaluation
Online Contents | 2017|Keywords: Security -
On the Tightness of Forward-Secure Signature Reductions
Online Contents | 2018|Keywords: Forward security -
OSHA Signs Two-Year Training Agreement
Online Contents | 2017Keywords: Occupational health and safety -
Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
Tema Archive | 2011|Keywords: Sicherheit -
A mechanism to enforce privacy in vehicle-to-infrastructure communication
Tema Archive | 2008|Keywords: Sicherheit -
Sicherheits- und Datenschutzanforderungen an Smart Grid-Technologien
Online Contents | 2012|Keywords: safety, security -
BlackEye: automatic IP blacklisting using machine learning from security logs
Online Contents | 2019|Keywords: Security logs -
OSHA Announces Safety Stand-Down for Heat at Worksites Throughout Southeast
Online Contents | 2016Keywords: Occupational health and safety -
Physische Sicherheit in der Mensch-Roboter Kollaboration
Online Contents | 2019|Keywords: robot safety -
A sensitive data aggregation scheme for body sensor networks based on data hiding
Online Contents | 2012|Keywords: Security -
A highly safe battery with a non-flammable triethyl-phosphate-based electrolyte
Tema Archive | 2015|Keywords: Sicherheit -
Secure Key Distribution Based on Dynamic Chaos Synchronization of Cascaded Semiconductor Laser Systems
Online Contents | 2017|Keywords: communication system security, Security -
OSHA Updates Recommended Practices for Safety and Health Programs
Online Contents | 2016Keywords: Occupational health and safety -
VoIP Compliance. Rechtliche Aspekte von VoIP im Unternehmenseinsatz
Tema Archive | 2007|Keywords: VoIP-Sicherheit -
Energy harvesting communications: Part 1 [Guest Editorial]
Online Contents | 2015|Keywords: Security, Network security -
Optimization study of a packet classification algorithm
Online Contents | 2007|Keywords: Computer security, Communication security -
A Sagnac-Michelson fibre optic interferometer: Signal processing for disturbance localization
Online Contents | 2007|Keywords: security technology -
A Sagnac-Michelson fibre optic interferometer: Signal processing for disturbance localization
Online Contents | 2007|Keywords: security technology -
Practical deniable authentication for pervasive computing environments
Online Contents | 2016|Keywords: Security -
The BT Risk Cockpit — a visual approach to ORM
Online Contents | 2007|Keywords: Security Risk Assessment, Information Security Management System -
Pre-emptive Countermeasures - Potential Game Changer for Airborne Self Protection
Online Contents | 2015|Keywords: National security -
A unifying perspective on proximity-based cellular-assisted mobile social networking
Online Contents | 2016|Keywords: Security, Network security -
Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
Online Contents | 2015|Keywords: physical layer security integration, Network security, Data security, telecommunication security -
Multilateral remedial actions and the proposal for the cost sharing among European transmission system operators (TSOs): lessons learnt from 25.03.2013 (case study)
Online Contents | 2014|Keywords: security, TSO Security Cooperation (TSC) -
Statistical network protocol identification with unknown pattern extraction
Online Contents | 2019|Keywords: Network security -
Teaching Network Security With IP Darkspace Data
Online Contents | 2016|Keywords: Security, Network security, Communication system security -
An efficient remote use authentication scheme using smart cards
Tema Archive | 2000|Keywords: Sicherheit -
A novel group-centric secure information sharing model with trust level considered
Online Contents | 2015|Keywords: Safety and security measures -
Anonymous identity-based broadcast encryption technology for smart city information system
Online Contents | 2017|Keywords: Chosen-ciphertext security -
Packets in peril [voice over IP security issues]
IET Digital Library Archive | 2004|Keywords: voice over IP security, security threats, telecommunication security, security of data -
A survey on smart power grid: frameworks, tools, security issues, and solutions
Online Contents | 2017|Keywords: Security issues -
Establishing Electrical Safety Sense in the Workplace
Online Contents | 2016Keywords: Occupational health and safety -
Security-Reliability Tradeoff Analysis of Multirelay-Aided Decode-and-Forward Cooperation Systems
Online Contents | 2016|Keywords: Security, Communication system security, security–reliability tradeoff (SRT) -
The Arbitrarily Varying Wiretap Channel-Secret Randomness, Stability, and Super-Activation
Online Contents | 2016|Keywords: Security, Network security, Information security -
Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing
Online Contents | 2016|Keywords: Computer security, Network security, security health
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.