Year of publication
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
1–20 of 251 hits
Sort by:
Sort by:
-
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications
British Library Conference Proceedings | 2014|Keywords: Database security, System security, Network security -
Forward Secure Certificateless Proxy Signature Scheme
British Library Conference Proceedings | 2013|Keywords: Database security, System security, Network security -
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique
British Library Conference Proceedings | 2014|Keywords: Database security, System security, Network security -
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting
British Library Conference Proceedings | 2013|Keywords: Database security, System security, Network security -
Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks
British Library Conference Proceedings | 2013|Keywords: Database security, System security, Network security -
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security -
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks
British Library Conference Proceedings | 2013|Keywords: Computer security, Information security, Security -
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grostl
British Library Conference Proceedings | 2010|Keywords: Computer security, Information security -
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher
British Library Conference Proceedings | 2012|Keywords: Computer security, Security applications -
On the Release of CRLs in Public Key Infrastructure
British Library Conference Proceedings | 2006|Keywords: Security, Systems security -
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion
British Library Conference Proceedings | 2013|Keywords: Computer security, Multimedia security, Security -
New Paradigm of Inference Control with Trusted Computing
British Library Conference Proceedings | 2007|Keywords: Database security, Applications security -
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains
British Library Conference Proceedings | 2010|Keywords: Computer security, Information systems security -
Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts
British Library Conference Proceedings | 2014|Keywords: Computer security, Security -
A New Framework for RFID Privacy
British Library Conference Proceedings | 2010|Keywords: Computer security -
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis
British Library Conference Proceedings | 2011|Keywords: Computer security, Information security applications -
Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)
British Library Conference Proceedings | 2006|Keywords: Computer security, Communications security, Information security -
Full-Round Differential Attack on TWIS Block Cipher
British Library Conference Proceedings | 2011|Keywords: Computer security, Information security applications -
Imaging cargo containers using gravity gradiometry (Invited Paper) [6204-01]
British Library Conference Proceedings | 2006|Keywords: Port security, Harbor security -
Integral Attacks on Reduced-Round ARIA Block Cipher
British Library Conference Proceedings | 2010|Keywords: Computer security, Information security practice, Information security experience