Year of publication
Source
Type of material
Licence
1–50 of 28,986 hits
Sort by:
Sort by:
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Study on the Problems and Countermeasures of Information Security
Tema Archive | 2012|Keywords: Internet-Sicherheit, Sicherheit, nationale Sicherheit -
Limits of Provable Security for Homomorphic Encryption
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archive | 2013|Keywords: passive Sicherheit, aktive Sicherheit -
On the Feasibility of Extending Oblivious Transfer
Tema Archive | 2013|Keywords: Sicherheit, statische Sicherheit -
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
Provably Secure Higher-Order Masking of AES
Tema Archive | 2011|Keywords: Sicherheit, beweisbare Sicherheit -
A proof of revised yahalom protocol in the Bellare and Rogaway (1993) model
Tema Archive | 2007|Keywords: Sicherheit, beweisbare Sicherheit -
Counter- b DM: A Provably Secure Family of Multi-Block-Length Compression Functions
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Authenticated Encryption: How Reordering Can Impact Performance
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
SENTINEL: Securing Legacy Firefox Extensions
Tema Archive | 2015|Keywords: Web-Browser-Sicherheit, Browser-Sicherheit -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Tema Archive | 2014|Keywords: Sicherheit -
The Impact of Standards in Web Services Security
Tema Archive | 2014|Keywords: Sicherheit, Web-Services-Sicherheit, Services-Sicherheit -
Security of the Internet of Things: perspectives and challenges
Tema Archive | 2014|Keywords: Sicherheit -
Stereotactic body radiation therapy: The report of AAPM Task Group 101
Tema Archive | 2010|Keywords: Sicherheit -
Terahertz imaging system for stand-off detection of threats
Tema Archive | 2007|Keywords: Sicherheit, nationale Sicherheit -
Everlasting Multi-party Computation
Tema Archive | 2013|Keywords: Sicherheit, immerwährende Sicherheit -
A Qualitative Metrics Vector for the Awareness of Smartphone Security Users
Tema Archive | 2013|Keywords: Sicherheit, User-Account-Sicherheit -
The Application of Dispatch Operation Ticket System Based on Intelligent Anti-Misoperation Method
Tema Archive | 2013|Keywords: elektrische Sicherheit, Sicherheit -
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions
Tema Archive | 2013|Keywords: Sicherheit -
DNSSEC: a protocol toward securing the Internet infrastructure
Tema Archive | 2007|Keywords: Sicherheit, Internet-Sicherheit -
Methode zur Berechnung der Feldeffektivität integraler Fußgängerschutzsysteme
Tema Archive | 2011|Keywords: aktive Sicherheit, passive Sicherheit, integrale Sicherheit -
Security Model and Analysis of FHMQV, Revisited
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Survey on the Web Services Security Specifications
Tema Archive | 2013|Keywords: Sicherheit, Services-Sicherheit, Internet-Services-Sicherheit -
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
On the Security of TLS-DHE in the Standard Model
Tema Archive | 2012|Keywords: Internet-Sicherheit -
A joint model for usability and security of the passenger process in airports
Tema Archive | 2009|Keywords: Sicherheit, brauchbare Sicherheit -
Stability, safety and operability of small fishing vessels
Tema Archive | 2014|Keywords: Sicherheit -
Waters Signatures with Optimal Security Reduction
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited
Tema Archive | 2013|Keywords: User-Account-Sicherheit, Sicherheit -
Preventing hydrogen detonations in road tunnels hydrogen trap concept
Tema Archive | 2014|Keywords: Sicherheit, passive Sicherheit -
Enhancing Security in Medical Image Communication with JPEG2000 Compression and Lossless Watermarking
Tema Archive | 2013|Keywords: medizinische Sicherheit, Sicherheit -
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
There's nothing ‘smart’ about insecure connected devices
Tema Archive | 2014|Keywords: IT-Sicherheit, Netzwerk-Sicherheit -
Provable Second Preimage Resistance Revisited
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Criticality of Iron and Its Principal Alloying Elements
Tema Archive | 2014|Keywords: Sicherheit, nationale Sicherheit -
Cyber situational awareness through network anomaly detection: state of the art and new approaches
Tema Archive | 2015|Keywords: IT-Sicherheit, Sicherheit, nationale Sicherheit -
Sicherheit auf S-Klasse-Niveau
Tema Archive | 2013|Keywords: aktive Sicherheit, äußere Sicherheit, passive Sicherheit -
Scalable packet classification with controlled cross-producting
Tema Archive | 2009|Keywords: Sicherheit -
Identity- und Access-Management mit EAI-Konzepten und -Technologien
Tema Archive | 2008|Keywords: Anwender-Account-Sicherheit, Sicherheit -
Provable Security for the Fuzzy Fingerprint Vault
Tema Archive | 2010|Keywords: Sicherheit, beweisbare Sicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.