Year of publication
Type of media
Type of material
Licence
Language
1–20 of 368 hits
Sort by:
Sort by:
-
Very High Order Masking: Efficient Implementation and Security Evaluation
Free accessBASE | 2017|Keywords: Security evaluation -
Masking Proofs are Tight and How to Exploit it in Security Evaluations
Free accessBASE | 2018|Keywords: Security evaluation -
Chaos-based model for encryption and decryption of digital images
Online Contents | 2015|Keywords: Security evaluation -
Chaos-based model for encryption and decryption of digital images
Online Contents | 2015|Keywords: Security evaluation -
A new discrete chaotic map application in image encryption algorithm
IOP Institute of Physics | 2022|Keywords: security evaluation -
A footprint-based water security assessment: An analysis of Hunan province in China
Elsevier | 2019|Keywords: Water security evaluation -
Cloud services security-driven evaluation for multiple tenants
Online Contents | 2020|Keywords: Security evaluation -
Empirical analysis of transaction malleability within blockchain-based e-Voting
Elsevier | 2020|Keywords: Security evaluation -
Analysis and Security Evaluation of Security Threat on Broadcasting Service
Online Contents | 2017|Keywords: Security evaluation -
Hyper-chaotic Feeded GA (HFGA): a reversible optimization technique for robust and sensitive image encryption
Online Contents | 2017|Keywords: Security evaluation -
Hyper-chaotic Feeded GA (HFGA): a reversible optimization technique for robust and sensitive image encryption
Online Contents | 2017|Keywords: Security evaluation -
Evaluation and analysis of ecological security in arid areas of Central Asia based on the emergy ecological footprint (EEF) model
Elsevier | 2019|Keywords: Ecological security evaluation -
A game-theoretic approach to model and quantify the security of cyber-physical systems
Elsevier | 2017|Keywords: Security evaluation -
Simulation of transaction malleability attack for blockchain-based e-Voting
Elsevier | 2020|Keywords: Security Evaluation -
A method for evaluating the consequence propagation of security attacks in cyber–physical systems
Elsevier | 2016|Keywords: Security evaluation -
A high performance fingerprint liveness detection method based on quality related features
Elsevier | 2010|Keywords: Security evaluation -
Influence Analysis on the Unloading of a Pit Excavation to the Structure of Metro Station Nearby
National licenceTrans Tech Publications | 2011|Keywords: Security Evaluation -
SecIVo: a quantitative security evaluation framework for internet voting schemes
Online Contents | 2016|Keywords: Security evaluation -
A Design of the Network Security Evaluation System
National licenceTrans Tech Publications | 2014|Keywords: Security Evaluation -
Lic-Sec: An enhanced AppArmor Docker security profile generator
Elsevier | 2021|Keywords: Security evaluation
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.