Year of publication
Type of media
Source
Subject
- ‹ All subjects
- Electrical engineering (9,084)
- Computer Science (2,962)
- Physics (1,210)
- Traffic engineering (755)
- Social Sciences (343)
- Mechanical engineering, energy technology (321)
- Mathematics (310)
- Economics (208)
- Civil engineering (158)
- Material science (116)
- Chemistry (99)
- Engineering (62)
- Medical technology (57)
- Law (43)
- Chemical and environmental engineering (40)
- Life Sciences (32)
- Other subjects (23)
- Mining (15)
- Earth Sciences (11)
- Architecture (4)
- Horticulture (2)
- Literature Studies (2)
- Study of religions
Type of material
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
Tema Archive | 2013|Keywords: Sicherheit, aktive Sicherheit, beweisbare Sicherheit -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archive | 2014|Keywords: Sicherheit, beweisbare Sicherheit -
Limits of Provable Security for Homomorphic Encryption
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Tema Archive | 2013|Keywords: passive Sicherheit, aktive Sicherheit -
On the Feasibility of Extending Oblivious Transfer
Tema Archive | 2013|Keywords: Sicherheit, statische Sicherheit -
An object-oriented modeling and simulation framework for bearings-only multi-target tracking using an unattended acoustic sensor network [8899-51]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
FMCW radar for the sense function of sense and avoid systems onboard UAVs [8899-43]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Characterization and Simulation of a Propagation Model to Determine the Secondary Effects that Generate High Power and Frequency Electromagnetic Signs When Impact on Electronic Systems and Surface of Vehicles Family AMX13 of The Land Force
TIBKAT | 2020|Keywords: National security, Computer security -
Utilizing wide area maritime domain awareness (MDA) data to cue a remote surveillance system [8899-44]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
A Portable GSM Base Station Solution for Military Communications in Hostile Environments
TIBKAT | 2020|Keywords: National security, Computer security -
Social Mobilizations as a Silent Instrument for Seizing Power: The Ecuadorian Case
TIBKAT | 2020|Keywords: National security, Computer security -
Provably Secure Higher-Order Masking of AES
Tema Archive | 2011|Keywords: physikalische Security, Sicherheit, beweisbare Sicherheit -
AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks
Free accessFraunhofer Publica | 2016|Keywords: SDN security, end-to-end security, network security -
Authenticated Encryption: How Reordering Can Impact Performance
Tema Archive | 2012|Keywords: Sicherheit, beweisbare Sicherheit -
MiSPiA: microelectronic single-photon 3D imaging arrays for low-light high-speed safety and security applications (Invited Paper) [8899-12]
British Library Conference Proceedings | 2013|Keywords: Quantum security, Security, Information security -
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Tema Archive | 2013|Keywords: Sicherheit, beweisbare Sicherheit -
Security analysis of OpenDayLight, ONOS, RoseMary and RYU SDN controllers
Free accessFraunhofer Publica | 2016|Keywords: security analysis, controller security, network security -
Everlasting Multi-party Computation
Tema Archive | 2013|Keywords: Sicherheit, immerwährende Sicherheit -
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes
British Library Conference Proceedings | 2014|Keywords: Database security, Computer security, Information theoretic security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.