Year of publication
Type of media
Source
Subject
Type of material
Licence
1–50 of 6,590 hits
Sort by:
Sort by:
-
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archive | 2007|Keywords: Sicherheit, beweisbare Sicherheit -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Tema Archive | 2014|Keywords: Sicherheit -
SENTINEL: Securing Legacy Firefox Extensions
Tema Archive | 2015|Keywords: Web-Browser-Sicherheit, Browser-Sicherheit -
Security of the Internet of Things: perspectives and challenges
Tema Archive | 2014|Keywords: Sicherheit -
DNSSEC: a protocol toward securing the Internet infrastructure
Tema Archive | 2007|Keywords: Sicherheit, Internet-Sicherheit -
Cyber situational awareness through network anomaly detection: state of the art and new approaches
Tema Archive | 2015|Keywords: IT-Sicherheit, Sicherheit, nationale Sicherheit -
Scalable packet classification with controlled cross-producting
Tema Archive | 2009|Keywords: Sicherheit -
Funknetze sicher planen. Ganzheitliche Abdeckung und Zugriffssicherheit als Herausforderung
Tema Archive | 2009|Keywords: WLAN-Sicherheit, Sicherheit -
Secure relay selection based on learning with negative externality in wireless networks
Tema Archive | 2013|Keywords: Sicherheit -
Remaining capacity estimation of Li-ion batteries based on temperature sample entropy and particle filter
Tema Archive | 2014|Keywords: Sicherheit -
Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit -
Management for sustainability in companies of the mining sector: an analysis of the main factors related with the business performance
Tema Archive | 2014|Keywords: Sicherheit -
Industrielle Lasersicherheit - Passiv oder proaktiv?
Tema Archive | 2011|Keywords: passive Sicherheit, aktive Sicherheit -
Privacy and security: international communications surveillance
Tema Archive | 2009|Keywords: Sicherheit, nationale Sicherheit -
A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks
Tema Archive | 2014|Keywords: Sicherheit -
Betriebliches Identitätsmanagement - Ein Rahmenwerk zur Entscheidungsunterstützung auf Basis des Balanced-Scorecard-Konzepts
Tema Archive | 2009|Keywords: Sicherheit, IT-Sicherheit -
Impact of Train Schedule on Pedestrian Movement on Stairway at Suburban Rail Transit Station in Mumbai, India
Tema Archive | 2015|Keywords: Sicherheit -
An effective DDoS attack detection and packet-filtering scheme
Tema Archive | 2006|Keywords: Sicherheit, Internet-Sicherheit -
A trust enhanced secure clustering framework for wireless ad hoc networks
Tema Archive | 2014|Keywords: Sicherheit -
High throughput growth and characterization of thin film materials
Tema Archive | 2013|Keywords: Sicherheit, nationale Sicherheit -
Design of 95 GHz, 2 MW Gyrotron for Communication and Security Applications
Tema Archive | 2011|Keywords: Sicherheit -
Building a “smart nail” for penetration tests on Li-ion cells
Tema Archive | 2014|Keywords: Sicherheit -
Priority-enabled optical shared protection: an online efficiency evaluation study
Tema Archive | 2007|Keywords: Sicherheit -
I2CSec: A secure serial Chip-to-Chip communication protocol
Tema Archive | 2011|Keywords: Sicherheit -
Application of joint time-frequency domain reflectometry for electric power cable diagnostics
Tema Archive | 2010|Keywords: elektrische Sicherheit -
Removing Cyclostationary Properties in a Chaos-Based Communication System
Tema Archive | 2011|Keywords: Sicherheit -
Communications surveillance: privacy and security at risk
Tema Archive | 2009|Keywords: Sicherheit -
Simple and efficient hash-based verifiable mixing for remote electronic voting
Tema Archive | 2010|Keywords: Sicherheit -
Provably secure authenticated key exchange protocols for low power computing clients
Tema Archive | 2006|Keywords: Sicherheit -
KCP&L reconductors energized 345-kV line
Tema Archive | 2003|Keywords: elektrische Sicherheit, Sicherheit -
A novel image encryption method based on total shuffling scheme
Tema Archive | 2011|Keywords: Sicherheit -
An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks
Tema Archive | 2014|Keywords: Sicherheit -
Identification of voltage collapse points and weak buses under security constraints using hybrid particle swarm optimization technique
Tema Archive | 2013|Keywords: Sicherheit -
Photon-counting multifactor optical encryption and authentication
Tema Archive | 2015|Keywords: optische Sicherheit -
On the implementation of security policies with adaptative encryption
Tema Archive | 2006|Keywords: Sicherheit -
Interference Alignment for the Multiantenna Compound Wiretap Channel
Tema Archive | 2011|Keywords: Sicherheit -
Growth in adversity: non-economic factors in telecommunications development in China
Tema Archive | 2003|Keywords: Sicherheit, nationale Sicherheit -
New Reconstruction Technologies Of Safety Pillar In Mines
Tema Archive | 2012|Keywords: Sicherheit -
Causes and Consequences of Water Flux on the Example of Transverse Heading Mina in the Salt Mine “Wieliczka”
Tema Archive | 2012|Keywords: Sicherheit -
Precondition of a Routing Algorithm Dealing with Multiple Security Metrics
Tema Archive | 2011|Keywords: Sicherheit -
Funktionale Sicherheit im Explosionsschutz
Tema Archive | 2006|Keywords: Sicherheit, funktionale Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.