Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Masking Proofs are Tight and How to Exploit it in Security Evaluations
Free accessBASE | 2018|Keywords: Security level, Security evaluation -
Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device
Free accessBASE | 2015|Keywords: Security proofs -
Verification of Security Protocols (Invited Talk)
Free accessDataCite | 2020|Keywords: Security protocols, security, Security and privacy → Formal security models -
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Free accessBASE | 2015|Keywords: Security, Side-channel security, Computational security, Security assessment -
Eliciting and refining requirements for comprehensible security
Free accessFraunhofer Publica | 2016|Keywords: information security, comprehensible security, security requirements -
Eliciting and refining requirements for comprehensible security
Free accessBASE | 2016|Keywords: information security, security requirements, comprehensible security -
Very High Order Masking: Efficient Implementation and Security Evaluation
Free accessBASE | 2017|Keywords: Security evaluation -
Validation of Perception and Decision-Making Systems for Autonomous Driving via Statistical Model Checking
Free accessBASE | 2019|Keywords: security -
Automatic Detection of Security Deficiencies and Refactoring Advises for Microservices
Free accessBASE | 2023|Keywords: Security, Security Scanning Tools, Security problems, Security scanning, Security scanning tool, Security testing, Security vulnerabilities -
Bounded-Deducibility Security (Invited Paper)
Free accessDataCite | 2021|Keywords: Security and privacy → Security requirements, Information-flow security, Security and privacy → Formal security models, Security and privacy → Logic and verification -
Security Analysis of Filecoin’s Expected Consensus in the Byzantine vs Honest Model
Free accessDataCite | 2023|Keywords: Security and privacy → Distributed systems security, Security analysis -
Web Application Security (Dagstuhl Seminar 18321)
Free accessBASE | 2019|Keywords: Web Application Security, Browser Security, Software Security, Human Aspects in Security -
MoDeNA : Enhancing User Security for Devices in Wireless Personal and Local Area Networks
Free accessBASE | 2017|Keywords: Security Requirement, Security Setting, Connection Security -
Berechnungsbeispiel zur funktionalen Sicherheit
Free accessFraunhofer Publica | 2014|Keywords: Sicherheit, funktionale Sicherheit -
Point-and-Shoot Security Design: Can We Build Better Tools for Developers?
Free accessFraunhofer Publica | 2012|Keywords: security properties, macroscopic security, security tools, security engineering, security model -
Managing security work in scrum: Tensions and challenges
Free accessFraunhofer Publica | 2017|Keywords: security work, software security, security requirements -
Managing security work in scrum: Tensions and challenges
Free accessBASE | 2017|Keywords: security requirements, security work, software security -
A Revised Taxonomy of Steganography Embedding Patterns
Free accessBASE | 2021|Keywords: Science of Security, Network Security, Information Security, Cyber Security -
Anomaly Detection in Cellular IoT with Machine Learning
Free accessBASE | 2021|Keywords: Mobile network security, IoT security, Cross layer security -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.