Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Requirements engineering for safety-critical systems
TIBKAT | 2021|Keywords: System safety, Industrial safety -
Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Technik-Verantwortung : Sicherheitspflichten der Ingenieure, Meister und Fachkräfte - Organisation und Aufsicht durch Management und Führungskräfte
TIBKAT | 2022|Keywords: Sicherheit, Technische Sicherheit -
Security officers’ attitudes towards training and their work environment
Online Contents | 2016|Keywords: Security management, Security personnel -
Security of the Internet of Things: perspectives and challenges
Tema Archive | 2014|Keywords: Sicherheit -
Stereotactic body radiation therapy: The report of AAPM Task Group 101
Tema Archive | 2010|Keywords: Sicherheit -
Everlasting Multi-party Computation
Tema Archive | 2013|Keywords: Sicherheit, immerwährende Sicherheit -
Terahertz imaging system for stand-off detection of threats
Tema Archive | 2007|Keywords: Sicherheit, nationale Sicherheit -
The Application of Dispatch Operation Ticket System Based on Intelligent Anti-Misoperation Method
Tema Archive | 2013|Keywords: elektrische Sicherheit, Sicherheit -
VoIP FMS: a comprehensive Voice over IP Fraud Management System : user/developer guide
TIBKAT | 2013|Keywords: Sicherheit -
A framework for enhancing mobile workflow execution through injection of flexible security controls
Online Contents | 2018|Keywords: Security injection, Security controls, Security modeling -
System-Level Diagnoses of Safety, Security and Reliability in Automotive Electrical/Electronic (E/E) Architectures
TIBKAT | 2017|Keywords: Technische Sicherheit -
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Passive Corruption in Statistical Multi-Party Computation (Extended Abstract)
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Shannon Impossibility, Revisited
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
SUNSHINE - Schutz vor Missbrauch und Bedrohung von VoIP-Netzwerken : Schlussbericht FOKUS ; Berichtszeitraum: 01.05.2011 - 31.07.2013
TIBKAT | 2013|Keywords: Sicherheit -
Optimum General Threshold Secret Sharing
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Cryptographic Security of Individual Instances
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Improvement of Collusion Secure Convolutional Fingerprinting Information Codes
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Two Protocols for Delegation of Computation
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Sicherheit im Eisenbahnbetrieb : 15. Wiener Eisenbahnkolloquium, 9.-10. März 2017
TIBKAT | 2017|Keywords: Technische Sicherheit -
Unconditionally Secure Blind Signatures
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Discretion and fairness in airport security screening
Online Contents | 2015|Keywords: Airline security, National security -
Safety signs on agricultural machinery: Pictorials do not always successfully convey their messages to target users
Online Contents | 2017|Keywords: Safety and security measures, Occupational safety, Safety signs -
DNSSEC: a protocol toward securing the Internet infrastructure
Tema Archive | 2007|Keywords: Sicherheit, Internet-Sicherheit -
Construction Methodology of Unconditionally Secure Signature Schemes
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Guessing Secrecy
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
OSHA Investigation of Fatality at Florida Electrical Cable Manufacturer Finds Safety Failure
Online Contents | 2017Keywords: Occupational health and safety, Safety regulations -
Secret Sharing Comparison by Transformation and Rotation
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Commitment and Authentication Systems
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Strongly Multiplicative Hierarchical Threshold Secret Sharing
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Introduction to Quantum Information Theory
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Anonymous Quantum Communication (Extended Abstract)
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
On Exponential Lower Bound for Protocols for Reliable Communication in Networks
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Utility-preserving differentially private data releases via individual ranking microaggregation
Online Contents | 2016|Keywords: Cryptography and Security -
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
British Library Conference Proceedings | 2011|Keywords: Database security, Computer security, Information Theoretic Security -
New Results on Unconditionally Secure Multi-receiver Manual Authentication
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Random Systems: Theory and Applications
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Euro Security : das deutsche Sicherheitsmagazin für Planer, Errichter und Anwender
[Deutsche Ausg.].TIBKAT | 2.1996,7 -Keywords: Technische Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.