Year of publication
Type of media
Source
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency Wallets
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Towards a Maturity Model for Crypto-Agility Assessment
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Whiteboxgrind — Automated Analysis of Whitebox Cryptography
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Removing the Field Size Loss from Duc et al.’s Conjectured Bound for Masked Encodings
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Limits of Provable Security for Homomorphic Encryption
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
SCADA Radio Blackbox Reverse Engineering
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Money Transfer on Transaction Signature-Based Ledger
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Data-Driven Evaluation of Intrusion Detectors: A Methodological Framework
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
Deep-Learning-Based Vulnerability Detection in Binary Executables
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security -
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes
TIBKAT | 2023|Keywords: COMPUTERS / Security / General, Computer security, COMPUTERS / Networking / Security, Network security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.