Year of publication
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Introduction to secure outsourcing computation
TIBKAT | 2016|Keywords: Database security, Computer security -
Ex vivo comparison of the giant and transfixing knot in equine open and closed castration
Wiley | 2016|Keywords: knot security, emasculator security -
Socio-cultural component of Ukrainian economic security
Taylor & Francis Verlag | 2020|Keywords: economic security, socio-cultural security, socio-cultural indicators of economic security -
The Freedom to Choose Secure Attachment Relationships in Adulthood
Taylor & Francis Verlag | 2013|Keywords: attachment security, attachment–security hypothesis -
Projekt SUBI: Sicherheit von Untergrundspeichern bei zyklischer Belastung: Funktionalität und Integrität von Speichern und Bohrungen
TIBKAT | 2020|Keywords: Sicherheit -
Water security in the Canadian Prairies: science and management challenges
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Journal of Biosecurity, Biosafety and Biodefense Law : JBBBL
National licenceGWLB - Gottfried Wilhelm Leibniz Bibliothek | 1.2011 -Keywords: Biologische Sicherheit -
A Glance at Transit System Safety
Free accessDOAJ | 2020|Keywords: system safety, safety life-cycle, safety plan, safety standard, safety case -
Development and validation of a taxonomy of adverse handover events in hospital settings
British Library Conference Proceedings | 2015|Keywords: Patient safety, Healthcare safety -
Cybersecurity issues in emerging technologies
TIBKAT | 2021|Keywords: COMPUTERS / Internet / Security, COMPUTERS / Networking / Security, Computer security -
Ransomware Families
The Most Prominent Ransomware StrainsSpringer Verlag | 2019|Keywords: Security -
Theoretical basis of ensuring the banking security of the state
Free accessDOAJ | 2023|Keywords: banking security, financial security, mechanism for ensuring banking security -
Standardisation and its discontents
British Library Conference Proceedings | 2015|Keywords: Patient safety, Healthcare safety -
A cost-effectiveness analysis of water security and water quality: impacts of climate and land-use change on the River Thames system
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
A review of the literature on patient participation in transitions of the elderly
British Library Conference Proceedings | 2015|Keywords: Patient safety, Healthcare safety -
A^2PG: alternative action plan generator
British Library Conference Proceedings | 2015|Keywords: Patient safety, Healthcare safety -
Perspectives on healthcare safety and quality: selected papers from the 2nd Nordic Conference on Research in Patient Safety and Quality in Healthcare
British Library Conference Proceedings | 2015|Keywords: Patient safety, Healthcare safety -
The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
The role of technology in achieving water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Blockchain-based public ecosystem for auditing security of software applications
Online Contents | 2021|Keywords: Software security, Security evaluation -
The BGW Perfectly-Secure MPC Protocol for Any Arbitrary Function
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Perfectly-Secure MPC for Small Number of Parties
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Yao’s Protocol for Secure 2-party Computation
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Fast elliptic curve point multiplication based on binary and binary non-adjacent scalar form methods
Online Contents | 2017|Keywords: EoT security, Mobile security, IoT security -
Development of a Metric Concept that Differentiates Between Normal and Abnormal Operational Aviation Data
Wiley | 2022|Keywords: safety metrics, safety performance -
The governance dimensions of water security: a review
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Water security, global change and land-atmosphere feedbacks
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Extreme rainfall, vulnerability and risk: a continental-scale assessment for South America
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
On Quantitative Methods for Clinical Safety Monitoring in Drug Development
Taylor & Francis Verlag | 2018|Keywords: IND safety reporting, Safety monitoring -
A holistic approach to improving safety for battery energy storage systems
Elsevier | 2024|Keywords: Process safety, Battery safety, Thermal safety -
Critical risk considerations in auto-ID security: Barcode vs. RFID
Elsevier | 2020|Keywords: Security -
Is water security necessary? An empirical analysis of the effects of climate hazards on national-level economic growth
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Managing hydroclimatic risks in federal rivers: a diagnostic assessment
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Risk-based principles for defining and managing water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Risks and responses to universal drinking water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
The national e-medication approaches in Germany, Switzerland and Austria: A structured comparison
Elsevier | 2016|Keywords: Drug therapy safety, Medication safety, Patient safety -
Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template
Elsevier | 2015|Keywords: Generic Security Template, Security incident -
Growing water scarcity in agriculture: future challenge to global water security
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Projekt SUBI: Sicherheit von Untergrundspeichern bei zyklischer Belastung: Funktionalität und Integrität von Speichern und Bohrungen
Free accessTIBKAT | 2020|Keywords: Sicherheit -
Domestic water and sanitation as water security: monitoring, concepts and strategy
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Catalysing sustainable water security: role of science, innovation and partnerships
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Water security in one blue planet: twenty-first century policy challenges for science
British Library Conference Proceedings | 2013|Keywords: Water security, Security -
Oblivious Transfer
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
The BGW Perfectly-Secure MPC Protocol for Linear Functions
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
The GMW MPC Protocol
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Perfectly-Secure MPC in the Pre-processing Model
Springer Verlag | 2022|Keywords: Security Services, Systems and Data Security, Principles and Models of Security, Mobile and Network Security -
Research on Information Security Model
National licenceTrans Tech Publications | 2012|Keywords: Security Model, Network Security, Information Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.