Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Hardware security for software privacy support
IET Digital Library Archive | 1999|Keywords: security of data -
Has AJAX over exposed itself? [Asynchronous JavaScript and XML]
IET Digital Library Archive | 2007Keywords: data security -
Has anyone seen my computer? [pervasive computing]
IET Digital Library Archive | 2005|Keywords: security of data -
Hiding data in images by optimal moderately-significant-bit replacement
IET Digital Library Archive | 2000|Keywords: data security -
Hiding data in multitone images for data communications
IET Digital Library Archive | 2004|Keywords: security of data, data security -
Hiding secret data adaptively in vector quantisation index tables
IET Digital Library Archive | 2006|Keywords: security of data -
High assurance security/safety for embedded, real-time systems
IET Digital Library Archive | 2005|Keywords: security of data -
High capacity image steganographic model
IET Digital Library Archive | 2000|Keywords: security of data -
Highlights of international research study on the use of Wi-Fi in electric power substations for protection and automation
IET Digital Library Archive | 2006|Keywords: data security -
HMG's Unified Incident Reporting and Alert Scheme
IET Digital Library Archive | 1996Keywords: security of data, data integrity -
How to prevent cheating in Pinch's scheme
IET Digital Library Archive | 1997|Keywords: security of data -
Human behavior analysis and its application to a pervasive computing security system
IET Digital Library Archive | 2006|Keywords: security of data -
ID-based authentication system for computer virus detection
IET Digital Library Archive | 1990|Keywords: data integrity -
Ideal secret sharing schemes with multipartite access structures
IET Digital Library Archive | 2006|Keywords: security of data -
Identification scheme based on quadratic residue
IET Digital Library Archive | 1998|Keywords: security of data -
Implementation of a parallel distributed TLM solver
IET Digital Library Archive | 2004|Keywords: security of data -
Improved (conference) public-key distribution system based on matrices
IET Digital Library Archive | 1987|Keywords: data security -
Improved masking algorithm for chaotic communications systems
IET Digital Library Archive | 1996|Keywords: security of data -
Improvements to internet access control security scheme
IET Digital Library Archive | 1992|Keywords: security of data -
Infamous five: IT security's most overlooked
IET Digital Library Archive | 2006|Keywords: security of data -
Information assurance in a rapidly changing environment
IET Digital Library Archive | 2005|Keywords: security of data -
Information warfare: battles in cyberspace
IET Digital Library Archive | 2001|Keywords: security of data -
Integrated approach for fault tolerance and digital signature in RSA
IET Digital Library Archive | 1999|Keywords: data security -
Integrated concurrency control protocol for hard real-time database systems
IET Digital Library Archive | 1997|Keywords: data integrity -
Integration of user authentication and access control
IET Digital Library Archive | 1992|Keywords: security of data -
Investigation of the use of the global system for mobile communications (GSM) network for metering and load management telemetry
IET Digital Library Archive | 1997|Keywords: data security protection -
Is your system really safe, secure and reliable enough?
IET Digital Library Archive | 2005|Keywords: security of data -
Keeping card data secure at low cost
IET Digital Library Archive | 1995|Keywords: card data security -
kth least significant bit of a plaintext in reciprocal number cryptosystem
IET Digital Library Archive | 1987|Keywords: security of data -
Limitations of challenge-response entity authentication
IET Digital Library Archive | 1989|Keywords: security of data -
Loaded highspeed computer data highway: a model to aid designers
IET Digital Library Archive | 1985|Keywords: data integrity systems -
Managing vulnerabilities in open source software
IET Digital Library Archive | 2005|Keywords: security of data -
MCYT baseline corpus: a bimodal biometric database
IET Digital Library Archive | 2003|Keywords: data integrity -
Medical device security in hospital networks incorporating medical devices
IET Digital Library Archive | 2006|Keywords: security of data -
Medical image databases: the ICOS project
IET Digital Library Archive | 1999|Keywords: data integrity -
Mobile gadgets catch the dreaded lurgi
IET Digital Library Archive | 2005|Keywords: security of data -
Mobile learning with Bluetooth-based e-learning system
IET Digital Library Archive | 2005|Keywords: security of data -
Mobile security - in search for comprehensive integrity
IET Digital Library Archive | 2004|Keywords: data security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.