Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Breaking RSA Generically Is Equivalent to Factoring
Free accessSpringer Verlag | 2009|Keywords: Systems and Data Security -
Power System Security Assessment (PSSSA) Module Using GEORFA Technique
Free accessSpringer Verlag | 2023|Keywords: Power system security -
Security for the core network of third generation mobile systems
Free accessSpringer Verlag | 2001|Keywords: MAP Security, Systems and Data Security -
Current Research on Convolutional Neural Network for Unmanned Driving
Free accessSpringer Verlag | 2024|Keywords: Systems and Data Security -
Development of an Exploratory Blockchain for Enhanced Data Security in Smart Grids
Free accessSpringer Verlag | 2022|Keywords: cyber security -
Automatische Bewertung und Überwachung von Safety & Security Eigenschaften: Strukturierung und Ausblick
Free accessSpringer Verlag | 2012|Keywords: Safety, Security -
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
Free accessSpringer Verlag | 2007|Keywords: Systems and Data Security -
Improved Generic Algorithms for Hard Knapsacks
Free accessSpringer Verlag | 2011|Keywords: Systems and Data Security -
Fast Cryptography in Genus 2
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Lossy Codes and a New Variant of the Learning-With-Errors Problem
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
A System for End-to-End Authentication of Adaptive Multimedia Content
Free accessSpringer Verlag | 2005|Keywords: multimedia security -
PassPattern System (PPS): A Pattern-Based User Authentication Scheme
Free accessSpringer Verlag | 2008|Keywords: Security -
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
Free accessSpringer Verlag | 2008|Keywords: Systems and Data Security -
How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Predicting UPDRS Scores in Parkinson’s Disease Based on Deep Learning
Free accessSpringer Verlag | 2024|Keywords: Systems and Data Security -
Situational Awareness Using Distributed Data Fusion with Evidence Discounting
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Renewing Cryptographic Timestamps
Free accessSpringer Verlag | 2002|Keywords: Security, Systems and Data Security -
Another Look at Provable Security
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Amplification of Chosen-Ciphertext Security
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
A Framework for Secure Message Transmission Using SMS-Based VPN
Free accessSpringer Verlag | 2007|Keywords: Security -
Leakage-Resilient Cryptography from Minimal Assumptions
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Practical Signatures from Standard Assumptions
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Nonlinear Optics in TiO2 Nanoscale Waveguides
Free accessSpringer Verlag | 2017|Keywords: Security Science and Technology -
Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
A Neural Network Based Security Tool for Analyzing Software
Free accessSpringer Verlag | 2013|Keywords: Security Tools -
The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications
Free accessSpringer Verlag | 2017|Keywords: Systems and Data Security -
Resource-Restricted Indifferentiability
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
A PKI-based End-To-End Secure Infrastructure for Mobile E-Commerce
Free accessSpringer Verlag | 2001|Keywords: wireless security, PKI end-to-end security -
MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks
Free accessSpringer Verlag | 2017|Keywords: Systems and Data Security -
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Flow-Based Detection of IPv6-specific Network Layer Attacks
Free accessSpringer Verlag | 2017|Keywords: Systems and Data Security -
Efficient Cryptosystems from 2 k -th Power Residue Symbols
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Research on Data Security Framework for the New Generation Mobile Network
Free accessSpringer Verlag | 2022|Keywords: data security -
Public Key Infrastructure: managing the e-Business security
Free accessSpringer Verlag | 2000|Keywords: Information Security, Security Requirement -
How to Watermark Cryptographic Functions
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Graph-Theoretic Algorithms for the “Isomorphism of Polynomials” Problem
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Multi-resonant Metamaterials for Visible and Near-IR Frequencies
Free accessSpringer Verlag | 2017|Keywords: Security Science and Technology -
Homomorphic Signatures for Polynomial Functions
Free accessSpringer Verlag | 2011|Keywords: Systems and Data Security -
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Medical Image Super-Resolution Reconstruction Algorithms on Deep Learning
Free accessSpringer Verlag | 2024|Keywords: Systems and Data Security -
Security on ATM Networks
Free accessSpringer Verlag | 1999|Keywords: Security Service, Systems and Data Security -
Proving Tight Security for Rabin-Williams Signatures
Free accessSpringer Verlag | 2008|Keywords: Systems and Data Security -
Mapping the Local Density of States of Periodic Plasmonic Nanostructures with Stochastic Super-resolution
Free accessSpringer Verlag | 2017|Keywords: Security Science and Technology -
Towards Internet Scale Quality-of-Experience Measurement with Twitter
Free accessSpringer Verlag | 2017|Keywords: Systems and Data Security -
Security Attacks and Countermeasures in 5G Enabled Internet of Things
Free accessSpringer Verlag | 2023|Keywords: Security and privacy
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.