Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers
British Library Conference Proceedings | 2012|Keywords: Data security -
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
British Library Conference Proceedings | 2012|Keywords: Data security -
Privacy Enhanced Access Control for Outsourced Data Sharing
British Library Conference Proceedings | 2012|Keywords: Data security -
Efficient Private Proximity Testing with GSM Location Sketches
British Library Conference Proceedings | 2012|Keywords: Data security -
Cryptographic Rule-Based Trading (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs
British Library Conference Proceedings | 2012|Keywords: Data security -
Beyond Risk-Based Access Control: Towards Incentive-Based Access Control
British Library Conference Proceedings | 2012|Keywords: Data security -
Metrics for Measuring ISP Badness: The Case of Spam (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security
British Library Conference Proceedings | 2012|Keywords: Data security -
A Non-interactive Range Proof with Constant Communication
British Library Conference Proceedings | 2012|Keywords: Data security -
Towards Secure Bioinformatics Services (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
A Cache Timing Attack on AES in Virtualization Environments
British Library Conference Proceedings | 2012|Keywords: Data security -
Proximax: Measurement-Driven Proxy Dissemination (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
Authenticated Key Exchange under Bad Randomness
British Library Conference Proceedings | 2012|Keywords: Data security -
Impeding Individual User Profiling in Shopper Loyalty Programs
British Library Conference Proceedings | 2012|Keywords: Data security -
Homomorphic Signatures for Digital Photographs
British Library Conference Proceedings | 2012|Keywords: Data security -
Oblivious Outsourced Storage with Delegation
British Library Conference Proceedings | 2012|Keywords: Data security -
A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice
British Library Conference Proceedings | 2012|Keywords: Data security -
Oblivious Printing of Secret Messages in a Multi-party Setting
British Library Conference Proceedings | 2012|Keywords: Data security -
Attacking the Washington, D.C. Internet Voting System
British Library Conference Proceedings | 2012|Keywords: Data security -
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs
British Library Conference Proceedings | 2012|Keywords: Data security -
An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs
British Library Conference Proceedings | 2012|Keywords: Data security -
A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time
British Library Conference Proceedings | 2012|Keywords: Data security -
Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools
British Library Conference Proceedings | 2012|Keywords: Data security -
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
British Library Conference Proceedings | 2010|Keywords: Data security -
All You Can Eat or Breaking a Real-World Contactless Payment System
British Library Conference Proceedings | 2010|Keywords: Data security -
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
British Library Conference Proceedings | 2010|Keywords: Data security -
Design and Implementation of a Key-Lifecycle Management System
British Library Conference Proceedings | 2010|Keywords: Data security -
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel)
British Library Conference Proceedings | 2010|Keywords: Data security -
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk)
British Library Conference Proceedings | 2010|Keywords: Data security -
Lightweight Cryptography and DPA Countermeasures: A Survey
British Library Conference Proceedings | 2010|Keywords: Data security -
When Information Improves Information Security
British Library Conference Proceedings | 2010|Keywords: Data security -
Using Sphinx to Improve Onion Routing Circuit Construction
British Library Conference Proceedings | 2010|Keywords: Data security -
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
British Library Conference Proceedings | 2010|Keywords: Data security -
Multiple Denominations in E-cash with Compact Transaction Data
British Library Conference Proceedings | 2010|Keywords: Data security -
On Robust Key Agreement Based on Public Key Authentication
British Library Conference Proceedings | 2010|Keywords: Data security -
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
British Library Conference Proceedings | 2010|Keywords: Data security -
Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication
British Library Conference Proceedings | 2010|Keywords: Data security -
Constructive Cryptography - A Primer
British Library Conference Proceedings | 2010|Keywords: Data security -
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions
British Library Conference Proceedings | 2010|Keywords: Data security -
Extending IPsec for Efficient Remote Attestation
British Library Conference Proceedings | 2010|Keywords: Data security -
A Secure and Privacy-Preserving Targeted Ad-System
British Library Conference Proceedings | 2010|Keywords: Data security -
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results
British Library Conference Proceedings | 2010|Keywords: Data security -
Lighten Encryption Schemes for Secure and Private RFID Systems
British Library Conference Proceedings | 2010|Keywords: Data security -
Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks
British Library Conference Proceedings | 2010|Keywords: Data security -
Intention-Disguised Algorithmic Trading
British Library Conference Proceedings | 2010|Keywords: Data security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.