Year of publication
Type of media
Subject
Type of material
Licence
1–20 of 4,175 hits
Sort by:
Sort by:
-
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archive | 2007|Keywords: Sicherheit, beweisbare Sicherheit -
SENTINEL: Securing Legacy Firefox Extensions
Tema Archive | 2015|Keywords: Web-Browser-Sicherheit, Browser-Sicherheit -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Tema Archive | 2014|Keywords: Sicherheit -
The Impact of Standards in Web Services Security
Tema Archive | 2014|Keywords: Sicherheit, Web-Services-Sicherheit, Services-Sicherheit -
Security of the Internet of Things: perspectives and challenges
Tema Archive | 2014|Keywords: Sicherheit -
DNSSEC: a protocol toward securing the Internet infrastructure
Tema Archive | 2007|Keywords: Sicherheit, Internet-Sicherheit -
There's nothing ‘smart’ about insecure connected devices
Tema Archive | 2014|Keywords: IT-Sicherheit, Netzwerk-Sicherheit -
Scalable packet classification with controlled cross-producting
Tema Archive | 2009|Keywords: Sicherheit -
Cyber situational awareness through network anomaly detection: state of the art and new approaches
Tema Archive | 2015|Keywords: IT-Sicherheit, Sicherheit, nationale Sicherheit -
Special issue on security and privacy of blockchain technologies
Online Contents | 2020|Keywords: Sicherheit -
Identity- und Access-Management mit EAI-Konzepten und -Technologien
Tema Archive | 2008|Keywords: Anwender-Account-Sicherheit, Sicherheit -
Security Audit of a Blockchain-Based Industrial Application Platform
Free accessBASE | 2021|Keywords: IT-Sicherheit -
Secure relay selection based on learning with negative externality in wireless networks
Tema Archive | 2013|Keywords: Sicherheit -
Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance
Tema Archive | 2010|Keywords: Sicherheit, nationale Sicherheit -
An overview of anomaly detection techniques: existing solutions and latest technological trends
Tema Archive | 2007|Keywords: Sicherheit -
Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit -
Correction to: A decentralized honeypot for IoT Protocols based on Android devices
Online Contents | 2022|Keywords: Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.