Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Homomorphic Signatures for Digital Photographs
British Library Conference Proceedings | 2012|Keywords: Data security -
Oblivious Outsourced Storage with Delegation
British Library Conference Proceedings | 2012|Keywords: Data security -
A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice
British Library Conference Proceedings | 2012|Keywords: Data security -
Metrics for Measuring ISP Badness: The Case of Spam (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
Oblivious Printing of Secret Messages in a Multi-party Setting
British Library Conference Proceedings | 2012|Keywords: Data security -
Attacking the Washington, D.C. Internet Voting System
British Library Conference Proceedings | 2012|Keywords: Data security -
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs
British Library Conference Proceedings | 2012|Keywords: Data security -
An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs
British Library Conference Proceedings | 2012|Keywords: Data security -
A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time
British Library Conference Proceedings | 2012|Keywords: Data security -
Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools
British Library Conference Proceedings | 2012|Keywords: Data security -
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security
British Library Conference Proceedings | 2012|Keywords: Data security -
A Non-interactive Range Proof with Constant Communication
British Library Conference Proceedings | 2012|Keywords: Data security -
Towards Secure Bioinformatics Services (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
CommitCoin: Carbon Dating Commitments with Bitcoin (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers
British Library Conference Proceedings | 2012|Keywords: Data security -
Privacy-Preserving Stream Aggregation with Fault Tolerance
British Library Conference Proceedings | 2012|Keywords: Data security -
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging
British Library Conference Proceedings | 2012|Keywords: Data security -
Deploying Secure Multi-Party Computation for Financial Data Analysis (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
Peeling Away Layers of an RFID Security System
British Library Conference Proceedings | 2012|Keywords: Data security -
Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)
British Library Conference Proceedings | 2012|Keywords: Data security -
Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data
British Library Conference Proceedings | 2012|Keywords: Data security -
Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Privacy Preserving Tree Augmented Naive Bayesian Multi-party Implementation on Horizontally Partitioned Databases
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Privacy Measures for Free Text Documents: Bridging the Gap between Theory and Practice
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
A Secure Smartphone Applications Roll-out Scheme
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Privacy-Preserving Statistical Analysis on Ubiquitous Health Data
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc Networks
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc Networks
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
TRAP: Open Decentralized Distributed Spam Filtering
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Risk Assessment for Mobile Devices
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Correcting a Delegation Protocol for Grids
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Mining Roles from Web Application Usage Patterns
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Best Effort and Practice Activation Codes
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Electrostatic Force Method: Trust Management Method Inspired by the Laws of Physics
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
A Safety-Preserving Mix Zone for VANETs
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
Towards Legal Privacy Risk Assessment and Specification
British Library Conference Proceedings | 2011|Keywords: Computer security, Security -
WCBP CMC strategy forum on extractables and leachables; challenges and stategies in biopharmaceutical development
British Library Conference Proceedings | 2011Keywords: Patient safety -
Identifying drinking water and water treatment systems vulnerabilities using the CARVER matrix method
British Library Conference Proceedings | 2011|Keywords: Security risks -
Rapid restoration of critical infrastructures: an all-hazards paradigm for fusion centres
British Library Conference Proceedings | 2011|Keywords: Security risks -
Regional critical infrastructure assessment: Kansas City
British Library Conference Proceedings | 2011|Keywords: Security risks -
Engineering of societal systems
British Library Conference Proceedings | 2011|Keywords: Security risks -
The banking and finance sector: new paradigms of resiliency and risk
British Library Conference Proceedings | 2011|Keywords: Security risks -
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
British Library Conference Proceedings | 2010|Keywords: Security -
Uncertainty in Interdependent Security Games
British Library Conference Proceedings | 2010|Keywords: Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.