Year of publication
Type of media
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Limits of Provable Security for Homomorphic Encryption
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archive | 2013|Keywords: passive Sicherheit, aktive Sicherheit -
Role of Safety Stressors on Proactive and Prosocial Safety Behaviors
ASCE | 2020|Keywords: Safety stressors, safety citizenship behavior, proactive safety behavior, prosocial safety behavior -
On the Feasibility of Extending Oblivious Transfer
Tema Archive | 2013|Keywords: Sicherheit, statische Sicherheit -
Performance Evaluation of a Hybrid Vehicle and Sensor Network to Prevent Traffic Accidents
TIBKAT | 2020|Keywords: National security, Computer security -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Keywords: National security, Computer security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Keywords: National security, Computer security -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Keywords: National security, Computer security -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Role of Safety Attitude: Impact on Hazard Recognition and Safety Risk Perception
ASCE | 2020|Keywords: Safety attitude, Safety risk perception, Construction safety -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
Provably Secure Higher-Order Masking of AES
Tema Archive | 2011|Keywords: physikalische Security, Sicherheit, beweisbare Sicherheit -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security -
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Security analysis of OpenDayLight, ONOS, RoseMary and RYU SDN controllers
Free accessFraunhofer Publica | 2016|Keywords: security analysis, controller security, network security -
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Authenticated Encryption: How Reordering Can Impact Performance
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
Following the Advice of Albert Einstein for a Dam Break Study
TIBKAT | 2019|Keywords: Technische Sicherheit -
Dust Off Your PMP Studies! Simplified Methods of Screening and Verifying Aging Site Specific PMP Studies
TIBKAT | 2019|Keywords: Technische Sicherheit -
Taking Action on Low-Head Dams: A National Inventory
TIBKAT | 2019|Keywords: Technische Sicherheit -
Repair or Replace? Considerations for Dam Rehabilitation
TIBKAT | 2019|Keywords: Technische Sicherheit -
Inundation Mapping and Emergency Action Plan — a California Dam Safely Initiative
TIBKAT | 2019|Keywords: Technische Sicherheit -
Evaluating the Stability of Existing Dry-stacked Stone Masonry Faced Earthen Embankment Dams
TIBKAT | 2019|Keywords: Technische Sicherheit -
High Capacity Bar Anchors - All Bars are Not Created Equal
TIBKAT | 2019|Keywords: Technische Sicherheit -
Eureka! There is Mica in Them Thar Hills! Understanding Complex Site Geology and the Impacts on Embankment Construction
TIBKAT | 2019|Keywords: Technische Sicherheit -
Dam Breach Modeling for Five Dams in Glendale California, Challenges and Lessons Learned
TIBKAT | 2019|Keywords: Technische Sicherheit -
Let's Apply This Knowledge to Dam Safety and Be Creative (presentation only)
TIBKAT | 2019|Keywords: Technische Sicherheit -
Hurricanes Harvey and Florence, Are Storms Changing and How Does This Effect PMP Depths?
TIBKAT | 2019|Keywords: Technische Sicherheit -
Let's Hear From the Climatologists : a Review of the Observed Data (presentation only)
TIBKAT | 2019|Keywords: Technische Sicherheit -
Leakage Resilience of the Blom's Key Distribution Scheme
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Modulus Computational Entropy
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
On (k, n) Visual Cryptography Scheme with t Essential Parties
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Not your Grandmother's Spillway Concrete, Use of New Technology in Concrete (cancelled)
TIBKAT | 2019|Keywords: Technische Sicherheit -
"Cookbook" for State Dam Safety Programs Emergency Response to Earthquakes
TIBKAT | 2019|Keywords: Technische Sicherheit -
Are You Comfortable Leaving the Safety of your Dam in the Hands of the Contractor?
TIBKAT | 2019|Keywords: Technische Sicherheit -
Advancing your Dam Safety Career- A panel of veteran Dam Safety Professionals (Geezers) discuss careers, what they did right, wrong and lessons learned from both
TIBKAT | 2019|Keywords: Technische Sicherheit -
Three-Dimensional Stability Analyses — How do We Integrate it For Dam Safety?
TIBKAT | 2019|Keywords: Technische Sicherheit -
Development of Standard Procedure for Simulating Breach Formation of a Levee Failure
TIBKAT | 2019|Keywords: Technische Sicherheit -
Best practices for simulating hydraulic structures with CFD
TIBKAT | 2019|Keywords: Technische Sicherheit -
How to Construct Strongly Secure Network Coding Scheme
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.