Year of publication
Type of media
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Model the Influence of Sybil Nodes in P2P Botnets
British Library Conference Proceedings | 2013|Keywords: Database security, System security, Network security -
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience
British Library Conference Proceedings | 2014|Keywords: Computer security, Informal security, Security practice -
The Research of Extraction Algorithm for Target Feature of Chest Bitmap
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Differential Attacks against Stream Cipher ZUC
British Library Conference Proceedings | 2012|Keywords: Computer security, Information security -
Thwarting E-mail Spam Laundering
British Library Conference Proceedings | 2009|Keywords: Computer security, Communications security -
Profit-aware overload protection in E-commerce Web sites
British Library Conference Proceedings | 2009|Keywords: Network security, System security -
Distributed and Secure Access Control in P2P Databases
British Library Conference Proceedings | 2010|Keywords: Database security, Applications security -
Result Integrity Verification of Outsourced Frequent Itemset Mining
British Library Conference Proceedings | 2013|Keywords: Database security, Applications security -
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
British Library Conference Proceedings | 2010|Keywords: Computer security, Information security -
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures
British Library Conference Proceedings | 2013|Keywords: Computer security, Communications security -
A Secure and Efficient Scheme for Cloud Storage against Eavesdropper
British Library Conference Proceedings | 2013|Keywords: Computer security, Communications security -
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery
British Library Conference Proceedings | 2004|Keywords: Computer security, Information security -
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)
British Library Conference Proceedings | 2006|Keywords: Computer security, Communications security, Information security -
A new dependable exchange protocol
British Library Conference Proceedings | 2006|Keywords: Internet security, Communications security -
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
British Library Conference Proceedings | 2008|Keywords: Computer security, Information security -
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)
British Library Conference Proceedings | 2006|Keywords: Computer security, Communications security, Information security -
An Effective Defense Against Email Spam Laundering
British Library Conference Proceedings | 2006|Keywords: Computer security, Communications security -
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
British Library Conference Proceedings | 2007|Keywords: Computer security, Provable security -
Efficient Fuzzy Matching and Intersection on Private Datasets
British Library Conference Proceedings | 2010|Keywords: Computer security, Information security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.