Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Mobile agent security
IET Digital Library Archive | 2002|Keywords: mobile agent security, security of data, security technology, telecommunication security -
Database security - the forgotten threat
IET Digital Library Archive | 2006|Keywords: database software security, national security information, security of data -
Human behavior analysis and its application to a pervasive computing security system
IET Digital Library Archive | 2006|Keywords: security of data, intelligent security system -
Agent system security
IET Digital Library Archive | 2003|Keywords: agent system security, security issues, security of data -
Secure mobile commerce
IET Digital Library Archive | 2002|Keywords: telecommunication security, security of data -
Hash function based on block cipher
IET Digital Library Archive | 1997|Keywords: computational security, security analysis -
New applications of p-subgroup problems in broadcast encryption services
IET Digital Library Archive | 2006|Keywords: security, telecommunication security -
A semi-infinite programming algorithm for dynamic security-constrained generation rescheduling
IET Digital Library Archive | 2006|Keywords: dynamic security-constrained generation rescheduling, power systems security, power system security -
Health modelling for agility in safety-critical systems development
IET Digital Library Archive | 2006|Keywords: safety-critical system development, safety-critical software, iterative security architecture -
Unmasking secrecy [security schemes]
IET Digital Library Archive | 2003|Keywords: security schemes -
Has anyone seen my computer? [pervasive computing]
IET Digital Library Archive | 2005|Keywords: middleware security, security of data -
The application of FACTS controllers to a deregulated system
IET Digital Library Archive | 2001|Keywords: security improvement, power system security, security indices -
Is your IPAQ talking to me?
IET Digital Library Archive | 2003|Keywords: security standards, security overseers, security threats, telecommunication security -
Digital signature scheme based on factoring and discrete logarithms
IET Digital Library Archive | 2001|Keywords: security -
Security of RSA-type cryptosystems over elliptic curves against Hastad attack
IET Digital Library Archive | 1994|Keywords: security -
Cost effective perimeter security
IET Digital Library Archive | 1995|Keywords: effective perimeter security, security, security practitioners -
Security for distributed applications
IET Digital Library Archive | 1995|Keywords: distributed applications security, security of data -
De-risking safety [military safety systems]
IET Digital Library Archive | 2006|Keywords: safety systems, military safety systems -
GDH group-based signature scheme with linkability
IET Digital Library Archive | 2006|Keywords: telecommunication security, gap Diffie-Hellman security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.