Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Mixcoin: Anonymity for Bitcoin with Accountable Mixes
British Library Conference Proceedings | 2014|Keywords: Data security -
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
British Library Conference Proceedings | 2014|Keywords: Data security -
Privacy Preserving Tatonnement: A Cryptographic Construction of an Incentive Compatible Market
British Library Conference Proceedings | 2014|Keywords: Data security -
MoP-2-MoP - Mobile Private Microblogging
British Library Conference Proceedings | 2014|Keywords: Data security -
On the (In)Security of Mobile Two-Factor Authentication
British Library Conference Proceedings | 2014|Keywords: Data security -
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
British Library Conference Proceedings | 2014|Keywords: Data security -
Garbled Searchable Symmetric Encryption
British Library Conference Proceedings | 2014|Keywords: Data security -
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
British Library Conference Proceedings | 2014|Keywords: Data security -
Practical Secure Decision Tree Learning in a Teletreatment Application
British Library Conference Proceedings | 2014|Keywords: Data security -
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security
British Library Conference Proceedings | 2014|Keywords: Data security -
A Secure Data Deduplication Scheme for Cloud Storage
British Library Conference Proceedings | 2014|Keywords: Data security -
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites
British Library Conference Proceedings | 2014|Keywords: Data security -
Elliptic Curve Cryptography in Practice
British Library Conference Proceedings | 2014|Keywords: Data security -
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes
British Library Conference Proceedings | 2014|Keywords: Data security -
A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates
British Library Conference Proceedings | 2014|Keywords: Data security -
Confidentiality Issues on a GPU in a Virtualized Environment
British Library Conference Proceedings | 2014|Keywords: Data security -
On the Awareness, Control and Privacy of Shared Photo Metadata
British Library Conference Proceedings | 2014|Keywords: Data security -
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users
British Library Conference Proceedings | 2014|Keywords: Data security -
BitIodine: Extracting Intelligence from the Bitcoin Network
British Library Conference Proceedings | 2014|Keywords: Data security -
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing
British Library Conference Proceedings | 2014|Keywords: Data security -
Identifying Risk Factors for Webserver Compromise
British Library Conference Proceedings | 2014|Keywords: Data security -
Challenges in Protecting Tor Hidden Services from Botnet Abuse
British Library Conference Proceedings | 2014|Keywords: Data security -
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
British Library Conference Proceedings | 2014|Keywords: Data security -
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages
British Library Conference Proceedings | 2014|Keywords: Data security -
Digital Check Forgery Attacks on Client Check Truncation Systems
British Library Conference Proceedings | 2014|Keywords: Data security -
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
British Library Conference Proceedings | 2014|Keywords: Data security -
Estimating Systematic Risk in Real-World Networks
British Library Conference Proceedings | 2014|Keywords: Data security -
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores
British Library Conference Proceedings | 2014|Keywords: Data security -
Scaling Private Set Intersection to Billion-Element Sets
British Library Conference Proceedings | 2014|Keywords: Data security -
Sample or Random Security - A Security Model for Segment-Based Visual Cryptography
British Library Conference Proceedings | 2014|Keywords: Data security -
Security Protocols and Evidence: Where Many Payment Systems Fail
British Library Conference Proceedings | 2014|Keywords: Data security -
A Privacy Preserving E-Payment Architecture
British Library Conference Proceedings | 2013|Keywords: Data security -
Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper)
British Library Conference Proceedings | 2013|Keywords: Data security -
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper)
British Library Conference Proceedings | 2013|Keywords: Data security -
Onions for Sale: Putting Privacy on the Market
British Library Conference Proceedings | 2013|Keywords: Data security -
Evaluating User Privacy in Bitcoin
British Library Conference Proceedings | 2013|Keywords: Data security -
Quantitative Analysis of the Full Bitcoin Transaction Graph
British Library Conference Proceedings | 2013|Keywords: Data security -
Interdependent Privacy: Let Me Share Your Data
British Library Conference Proceedings | 2013|Keywords: Data security -
Risks of Offline Verify PIN on Contactless Cards (Short Paper)
British Library Conference Proceedings | 2013|Keywords: Data security -
Parallel and Dynamic Searchable Symmetric Encryption
British Library Conference Proceedings | 2013|Keywords: Data security -
Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers
British Library Conference Proceedings | 2013|Keywords: Data security -
``Give Me Letters 2, 3 and 6!'': Partial Password Implementations and Attacks
British Library Conference Proceedings | 2013|Keywords: Data security -
Searchable Encryption Supporting General Boolean Expression Queries
British Library Conference Proceedings | 2013|Keywords: Data security -
Securely Solving Simple Combinatorial Graph Problems
British Library Conference Proceedings | 2013|Keywords: Data security -
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
British Library Conference Proceedings | 2013|Keywords: Data security -
Communication Services Empowered with a Classical Chaos Based Cryptosystem
British Library Conference Proceedings | 2013|Keywords: Data security -
Accumulators and U-Prove Revocation (Short Paper)
British Library Conference Proceedings | 2013|Keywords: Data security -
Unique Ring Signatures: A Practical Construction (Short Paper)
British Library Conference Proceedings | 2013|Keywords: Data security -
Can Nature Help Us Solve Risk Management Issues? Position Paper
British Library Conference Proceedings | 2013|Keywords: Data security -
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services
British Library Conference Proceedings | 2013|Keywords: Data security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.