Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
LUH institutes collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A New Class of Trapdoor Verifiable Delay Functions
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Decentralized Vision-Based Byzantine Agent Detection in Multi-robot Systems with IOTA Smart Contracts
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Efficient Attack-Surface Exploration for Electromagnetic Fault Injection
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Where is the Virtual Machine Within CPYTHON?
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Constructive side-channel analysis and secure design : 14th International Workshop, COSADE 2023, Munich, Germany, April 3-4, 2023 : proceedings
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Providing security on demand using invasive computing
Online Contents | 2016|Keywords: security and privacy – operating systems security, Security and privacy – embedded systems security, security and privacy – information flow control, Security and privacy →Systems security, Security and privacy →Systems security →Operating systems security, Security and privacy →Systems security →Information flow control -
ASCA vs. SASCA: A Closer Look at the AES Key Schedule
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Underwater Confidential Communications in JANUS
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
A Taxonomy and Gap-Analysis in Digital Privacy Education
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
A Survey on Identity-Based Blind Signature
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency Wallets
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Energy Consumption of Protected Cryptographic Hardware Cores: An Experimental Study
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
A CCFI Verification Scheme Based on the RISC-V Trace Encoder
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
SAMVA: Static Analysis for Multi-fault Attack Paths Determination
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Security Analysis of Improved EDHOC Protocol
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.