Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Cryptanalysis of a data security protection scheme for VoIP
IET Digital Library Archive | 2006|Keywords: hierarchical data security protection scheme -
Cryptanalysis of ElGamal type encryption schemes based on conic curves
IET Digital Library Archive | 2001|Keywords: data security -
Cryptanalysis of keystream generator due to Chan and Cheng
IET Digital Library Archive | 1998|Keywords: data security -
Cryptographically secure pseudorandom sequence generator based on reciprocal number cryptosystem
IET Digital Library Archive | 1988|Keywords: security of data -
Cyber security and implications for national infrastructure
IET Digital Library Archive | 2005|Keywords: security of data -
Cyber security and implications for national infrastructure
IET Digital Library Archive | 2004|Keywords: security of data -
Database security - the forgotten threat
IET Digital Library Archive | 2006|Keywords: security of data -
Data hiding approach for efficient image indexing
IET Digital Library Archive | 2002|Keywords: security of data -
Data hiding technologies for digital radiography
IET Digital Library Archive | 2005|Keywords: security of data -
Data privacy: fiction or reality? How much privacy are individuals entitled to under the law
IET Digital Library Archive | 2006|Keywords: security of data -
Designing secure intranets
IET Digital Library Archive | 1998|Keywords: data security, security of data -
Design of a physical layer security mechanism for CSMA/CD networks
IET Digital Library Archive | 1992|Keywords: security of data -
Design of keystream generator
IET Digital Library Archive | 1998|Keywords: data security, security of data -
Detecting privacy in attention aware system
IET Digital Library Archive | 2006|Keywords: security of data -
Development of an ultra high-secure and 1 Gbps optical transmission system using quantum noise diffusion cryptography
IET Digital Library Archive | 2005|Keywords: security of data -
Digital communications for power system protection: security, availability, and speed
IET Digital Library Archive | 2001|Keywords: security of data -
Digital document integrity
IET Digital Library Archive | 2000|Keywords: data integrity, security of data -
Digital signature scheme based on error-correcting codes
IET Digital Library Archive | 1990|Keywords: data security -
Digital signature with one-time pair of keys
IET Digital Library Archive | 2000|Keywords: data security -
Digital watermarking: applications, techniques and challenges
IET Digital Library Archive | 1999|Keywords: security of data -
Domain-based access control for distributed computing systems
IET Digital Library Archive | 1988|Keywords: security of data -
DWT-based high-capacity blind video watermarking, invariant to geometrical attacks
IET Digital Library Archive | 2003|Keywords: security of data -
Dynamically negotiated security service for multicast application in the active network
IET Digital Library Archive | 2006|Keywords: data integrity -
Economic aspects and needs in IT-security risk management for SMEs
IET Digital Library Archive | 2004|Keywords: security of data -
Efficient cheater identification method for threshold schemes
IET Digital Library Archive | 1997|Keywords: security of data -
Efficient fault-tolerant scheme based on the RSA system
IET Digital Library Archive | 2003|Keywords: data security -
Efficient identity-based multicast scheme from bilinear pairing
IET Digital Library Archive | 2005|Keywords: data integrity service, data integrity -
End to end data bearer performance characterisation for communications over wide area mobile networks
IET Digital Library Archive | 2003|Keywords: security of data -
Enhanced securely fair non-repudiation protocol
IET Digital Library Archive | 2006|Keywords: security of data -
Enhancing the security of El Gamal's signature scheme
IET Digital Library Archive | 1994|Keywords: data security -
Ensuring real-time data integrity in networked applications
IET Digital Library Archive | 2005|Keywords: real-time data integrity, data integrity -
eProduct security, compliance & risk
IET Digital Library Archive | 2006|Keywords: security of data -
Evaluation of IT security products, devices and systems
IET Digital Library Archive | 1996|Keywords: security of data -
Experiences in securing a regional telemetry system
IET Digital Library Archive | 2005|Keywords: security of data -
Fast algorithms for implementing RSA public key cryptosystem
IET Digital Library Archive | 1985|Keywords: data security -
Filling missing temperature values in weather data banks
IET Digital Library Archive | 2006|Keywords: data integrity -
Fixing of security flaw in IKE protocols
IET Digital Library Archive | 1999|Keywords: security of data -
Formal methods for database language design and constraint handling
IET Digital Library Archive | 1989|Keywords: data integrity -
Functionality and implementation issues for complex authorisation models
IET Digital Library Archive | 2006|Keywords: data integrity -
Future core networks system (FCNS) - a secure signalling protocol stack for the UMTS core network
IET Digital Library Archive | 2002|Keywords: security of data -
Future system specifications for traffic enforcement equipment
IET Digital Library Archive | 1996|Keywords: data integrity -
G3 facsimile security option - UK proposal for ITU-TS recommendation
IET Digital Library Archive | 1995|Keywords: data integrity -
Gambling on chips [radiofrequency identification chips - security]
IET Digital Library Archive | 2006|Keywords: security of data
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.