Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Worldwide cyber security
British Library Conference Proceedings | 2012|Keywords: Cyber security, Security -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Detection of Algebraic Manipulation in the Presence of Leakage
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
New Lower Bounds for Privacy in Communication Protocols
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
On (k, n) Visual Cryptography Scheme with t Essential Parties
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Leakage Resilience of the Blom's Key Distribution Scheme
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Modulus Computational Entropy
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
How to Construct Strongly Secure Network Coding Scheme
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Secure Two-Party Computation: A Visual Way
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Insider-Proof Encryption with Applications for Quantum Key Distribution
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Broadcast (and Round) Efficient Verifiable Secret Sharing
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Superposition Attacks on Cryptographic Protocols
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security -
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Passive Corruption in Statistical Multi-Party Computation (Extended Abstract)
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Shannon Impossibility, Revisited
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Cryptographic Security of Individual Instances
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Improvement of Collusion Secure Convolutional Fingerprinting Information Codes
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Optimum General Threshold Secret Sharing
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Two Protocols for Delegation of Computation
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honest Majority
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Guessing Secrecy
British Library Conference Proceedings | 2012|Keywords: Database security, Computer security, Information theoretic security -
Construction Methodology of Unconditionally Secure Signature Schemes
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Strongly Multiplicative Hierarchical Threshold Secret Sharing
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Unconditionally Secure Blind Signatures
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Secret Sharing Comparison by Transformation and Rotation
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Commitment and Authentication Systems
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
British Library Conference Proceedings | 2011|Keywords: Database security, Computer security, Information Theoretic Security -
Anonymous Quantum Communication (Extended Abstract)
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
On Exponential Lower Bound for Protocols for Reliable Communication in Networks
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
New Results on Unconditionally Secure Multi-receiver Manual Authentication
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Introduction to Quantum Information Theory
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
A Survey of Network Attacks Based on Protocol Vulnerabilities
British Library Conference Proceedings | 2014|Keywords: Information security, Network security -
Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Random Systems: Theory and Applications
British Library Conference Proceedings | 2009|Keywords: Database security, Computer security -
Common Randomness and Secret Key Capacities of Two-Way Channels
British Library Conference Proceedings | 2011|Keywords: Database security, Computer security, Information Theoretic Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.