Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Basic Concepts and Mathematical Aspects in Channel Coding: Multialternative Rules
Online Contents | 2016|Keywords: data integrity -
Designing an authenticated Hash function with a 2D chaotic map
Online Contents | 2021|Keywords: Data integrity -
DICOM imaging watermarking for hiding medical reports
Online Contents | 2020|Keywords: Data security -
Basic Concepts and Mathematical Aspects in Channel Coding: Multialternative Rules
Online Contents | 2016|Keywords: data integrity -
Dynamic Proofs of Retrievability Via Oblivious RAM
Online Contents | 2015|Keywords: Outsourced data integrity -
Dynamic Proofs of Retrievability Via Oblivious RAM
Online Contents | 2015|Keywords: Outsourced data integrity -
Trajectory anonymisation based on graph split using EMD
Online Contents | 2017|Keywords: Data security -
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model
Online Contents | 2016|Keywords: Data integrity -
A novel chaotic key-based algorithm for still images
Online Contents | 2017|Keywords: Data security -
Fix-and-relax approaches for controlled tabular adjustment
Online Contents | 2015|Keywords: Data integrity -
A trust model of cloud computing based on Quality of Service
Online Contents | 2013|Keywords: Data integrity -
Multifirm Models of Cybersecurity Investment Competition vs. Cooperation and Network Vulnerability
Online Contents | 2016|Keywords: Data security -
Blockchain based Chaotic Deep GAN Encryption scheme for securing medical images in a cloud environment
Online Contents | 2022|Keywords: Data security -
Flexible group key management and secure data transmission in mobile device communications using elliptic curve Diffie-Hellman cryptographic system
Online Contents | 2016|Keywords: Data security -
Sharing Multiple Secrets: Models, Schemes and Analysis
Online Contents | 2006|Keywords: data security -
Infrastructures protection based on heterogeneous networks
Online Contents | 2016|Keywords: Data security -
The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain
Online Contents | 2016|Keywords: Data integrity -
A differential game-theoretic model of auditing for data storage in cloud computing
Online Contents | 2017|Keywords: Data security -
Simplified and efficient framework for managing roles in cloud-based transaction processing systems using attribute-based encryption
Online Contents | 2017|Keywords: Data security -
Using big data in cybersecurity: operations research analysts search for 'cyber subs'
Online Contents | 2016|Keywords: Data security -
An ontology-driven approach to mobile data collection applications for the healthcare industry
Online Contents | 2013|Keywords: Data security -
Optimal selection of IT security safeguards from an existing knowledge base
Online Contents | 2016|Keywords: Data integrity -
Basic Concepts and Mathematical Aspects in Channel Coding: Multialternative Rules
Online Contents | 2016|Keywords: data integrity -
Optimizing dynamic investment decisions for railway systems protection
Online Contents | 2016|Keywords: Data security -
Design of Feedback Control for Networked Finite-Distributed Delays Systems with Quantization and Packet Dropout Compensation
Online Contents | 2015|Keywords: Data integrity -
Wargames illuminate cyber threat discovery: classroom seminar games provide a powerful analytic and educational toolset
Online Contents | 2017|Keywords: Data security -
Optimizing Dynamic Investment Decisions for Railway Systems Protection
Online Contents | 2015|Keywords: Data security -
Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors
Online Contents | 1996|Keywords: data security -
Big Data Paradigm: What is the Status of Privacy and Security?
Online Contents | 2017|Keywords: Big data security -
Evolving Fuzzy Rules for Anomaly Detection in Data Streams
Online Contents | 2015|Keywords: security of data
- ««
- «
- 1
- »»
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.