Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs
British Library Conference Proceedings | 2012|Keywords: Data security -
A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time
British Library Conference Proceedings | 2012|Keywords: Data security -
Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools
British Library Conference Proceedings | 2012|Keywords: Data security -
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
British Library Conference Proceedings | 2010|Keywords: Data security -
All You Can Eat or Breaking a Real-World Contactless Payment System
British Library Conference Proceedings | 2010|Keywords: Data security -
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
British Library Conference Proceedings | 2010|Keywords: Data security -
Design and Implementation of a Key-Lifecycle Management System
British Library Conference Proceedings | 2010|Keywords: Data security -
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel)
British Library Conference Proceedings | 2010|Keywords: Data security -
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk)
British Library Conference Proceedings | 2010|Keywords: Data security -
Lightweight Cryptography and DPA Countermeasures: A Survey
British Library Conference Proceedings | 2010|Keywords: Data security -
When Information Improves Information Security
British Library Conference Proceedings | 2010|Keywords: Data security -
Using Sphinx to Improve Onion Routing Circuit Construction
British Library Conference Proceedings | 2010|Keywords: Data security -
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
British Library Conference Proceedings | 2010|Keywords: Data security -
Multiple Denominations in E-cash with Compact Transaction Data
British Library Conference Proceedings | 2010|Keywords: Data security -
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions
British Library Conference Proceedings | 2010|Keywords: Data security -
Extending IPsec for Efficient Remote Attestation
British Library Conference Proceedings | 2010|Keywords: Data security -
A Secure and Privacy-Preserving Targeted Ad-System
British Library Conference Proceedings | 2010|Keywords: Data security -
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results
British Library Conference Proceedings | 2010|Keywords: Data security -
Lighten Encryption Schemes for Secure and Private RFID Systems
British Library Conference Proceedings | 2010|Keywords: Data security -
Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks
British Library Conference Proceedings | 2010|Keywords: Data security -
Intention-Disguised Algorithmic Trading
British Library Conference Proceedings | 2010|Keywords: Data security -
Embedded SFE: Offloading Server and Network Using Hardware Tokens
British Library Conference Proceedings | 2010|Keywords: Data security -
A Learning-Based Approach to Reactive Security
British Library Conference Proceedings | 2010|Keywords: Data security -
Unlinkable Priced Oblivious Transfer with Rechargeable Wallets
British Library Conference Proceedings | 2010|Keywords: Data security -
On Robust Key Agreement Based on Public Key Authentication
British Library Conference Proceedings | 2010|Keywords: Data security -
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
British Library Conference Proceedings | 2010|Keywords: Data security -
Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication
British Library Conference Proceedings | 2010|Keywords: Data security -
Constructive Cryptography - A Primer
British Library Conference Proceedings | 2010|Keywords: Data security -
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers
British Library Conference Proceedings | 2010|Keywords: Data security -
Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols
British Library Conference Proceedings | 2010|Keywords: Data security -
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure
British Library Conference Proceedings | 2010|Keywords: Data security -
A Traceability Attack against e-Passports
British Library Conference Proceedings | 2010|Keywords: Data security -
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory
British Library Conference Proceedings | 2010|Keywords: Data security -
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications
British Library Conference Proceedings | 2010|Keywords: Data security -
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
British Library Conference Proceedings | 2010|Keywords: Data security -
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
British Library Conference Proceedings | 2010|Keywords: Data security -
Certification Intermediaries and the Alternative
British Library Conference Proceedings | 2010|Keywords: Data security -
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits
British Library Conference Proceedings | 2010|Keywords: Data security -
Building Incentives into Tor
British Library Conference Proceedings | 2010|Keywords: Data security -
Implementing a High-Assurance Smart-Card OS
British Library Conference Proceedings | 2010|Keywords: Data security -
Securing the Use of RFID-Enabled Banknotes
British Library Conference Proceedings | 2010|Keywords: Data security -
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
British Library Conference Proceedings | 2010|Keywords: Data security -
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
British Library Conference Proceedings | 2010|Keywords: Data security -
Secure Computation with Fixed-Point Numbers
British Library Conference Proceedings | 2010|Keywords: Data security -
Ethical Proactive Threat Research (Position Paper)
British Library Conference Proceedings | 2010|Keywords: Data security -
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs
British Library Conference Proceedings | 2010|Keywords: Data security -
BetterThanPin: Empowering Users to Fight Phishing
British Library Conference Proceedings | 2010|Keywords: Data security -
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
British Library Conference Proceedings | 2010|Keywords: Data security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.