Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair
Springer Verlag | 2024|Keywords: Systems and Data Security -
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH
Springer Verlag | 2024|Keywords: Systems and Data Security -
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations
Springer Verlag | 2024|Keywords: Systems and Data Security -
Towards a Privacy-Preserving Attestation for Virtualized Networks
Springer Verlag | 2024|Keywords: Systems and Data Security -
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
Springer Verlag | 2024|Keywords: Systems and Data Security -
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks
Springer Verlag | 2024|Keywords: Systems and Data Security -
Generating Synthetic Data to Improve Intrusion Detection in Smart City Network Systems
Springer Verlag | 2024|Keywords: Systems and Data Security -
PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm
Springer Verlag | 2024|Keywords: Systems and Data Security -
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain
Springer Verlag | 2024|Keywords: Systems and Data Security -
Real-Time Data and Analytics on Building Management System to Control Energy Consumption
Springer Verlag | 2024|Keywords: Systems and Data Security -
Secure and Energy-Aware Data Transmission for IoT-WSNs with the Help of Cluster-Based Secure Optimal Routing
Springer Verlag | 2024|Keywords: Data security -
Multi-class Malware Detection via Deep Graph Convolutional Networks Using TF-IDF-Based Attributed Call Graphs
Springer Verlag | 2024|Keywords: Systems and Data Security -
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
Springer Verlag | 2024|Keywords: Systems and Data Security -
An Efficient Small Modulus Test and Its Applications to Delegated Computation Without Preprocessing
Springer Verlag | 2024|Keywords: Systems and Data Security -
An Empirical Study of the Imbalance Issue in Software Vulnerability Detection
Springer Verlag | 2024|Keywords: Systems and Data Security -
Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
Springer Verlag | 2024|Keywords: Systems and Data Security -
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation
Springer Verlag | 2024|Keywords: Systems and Data Security -
From Plaintext-Extractability to IND-CCA Security
Springer Verlag | 2024|Keywords: Systems and Data Security -
Real-Time Detection of Human Heart Rate and Blood Pressure During Exercise
Springer Verlag | 2024|Keywords: Systems and Data Security -
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities
Springer Verlag | 2024|Keywords: Systems and Data Security -
Finding All Impossible Differentials When Considering the DDT
Springer Verlag | 2024|Keywords: Systems and Data Security -
Surface Modification of Metallic Materials Using Laser and Plasma Technologies
Springer Verlag | 2024|Keywords: Systems and Data Security -
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing
Springer Verlag | 2024|Keywords: Systems and Data Security -
Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48
Springer Verlag | 2024|Keywords: Systems and Data Security -
A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation
Springer Verlag | 2024|Keywords: Systems and Data Security -
Generalized Implicit Factorization Problem
Springer Verlag | 2024|Keywords: Systems and Data Security -
Traffic Analysis by Adversaries with Partial Visibility
Springer Verlag | 2024|Keywords: Systems and Data Security -
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN
Springer Verlag | 2024|Keywords: Systems and Data Security -
Another Look at Differential-Linear Attacks
Springer Verlag | 2024|Keywords: Systems and Data Security -
A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident Reports
Springer Verlag | 2024|Keywords: Systems and Data Security -
Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme
Springer Verlag | 2024|Keywords: Systems and Data Security -
Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach
Springer Verlag | 2024|Keywords: Systems and Data Security -
A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism
Springer Verlag | 2024|Keywords: Systems and Data Security -
Towards Efficient Privacy-Preserving Deep Packet Inspection
Springer Verlag | 2024|Keywords: Systems and Data Security -
Optimised Back Propagation-Based Deep Residual Learning Network Algorithm for Detection of Diabetic Retinopathy in Retinal Fundus Images
Springer Verlag | 2024|Keywords: Systems and Data Security -
Modeling Obfuscation Stealth Through Code Complexity
Springer Verlag | 2024|Keywords: Systems and Data Security -
AI vs. Dinosaurs – Automated Re-implementation of Legacy Mainframe Applications in Java by Combining Program Synthesis and GPT
Springer Verlag | 2024|Keywords: Systems and Data Security -
FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models
Springer Verlag | 2024|Keywords: Systems and Data Security -
Farasha: A Provable Permutation-Based Parallelizable PRF
Springer Verlag | 2024|Keywords: Systems and Data Security -
URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures
Springer Verlag | 2024|Keywords: Systems and Data Security -
Verification Protocol for Stable Matching from Conditional Disclosure of Secrets
Springer Verlag | 2024|Keywords: Systems and Data Security -
GPChain: Optimizing Cross-Shard Transactions and Load Imbalance in Sharded Blockchain Networks
Springer Verlag | 2024|Keywords: Systems and Data Security -
BO-LCNN: butterfly optimization based lightweight convolutional neural network for remote data integrity auditing and data sanitizing model
Springer Verlag | 2024|Keywords: Data integrity auditing -
Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScript
Springer Verlag | 2024|Keywords: Systems and Data Security -
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
Springer Verlag | 2024|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.