Page 1 from 53,542 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources

Searching...

Synonyms were used for: Datensicherheit

Search without synonyms: keywords:(Datensicherheit)

Used synonyms:

  • data integrity
  • data security
  • datenintegritat
  • datensicherung
  • security of data
  1.  

    For your eyes only?

    Mileham, R. | IET | 2012
    Keywords: security of data
  2.  

    An efficient data integrity auditing protocol for cloud computing

    Garg, Neenu / Bawa, Seema / Kumar, Neeraj | Elsevier | 2020
    Keywords: Data integrity, Data integrity auditing
  3.  

    Comparative analysis of cloud data integrity auditing protocols

    Garg, Neenu / Bawa, Seema | Elsevier | 2016
    Keywords: Data integrity, Data integrity auditing
  4.  

    e-doctor's tips

    Vitaliev, D. | IET | 2008
    Keywords: security of data
  5.  

    Mash-up maps [management map data]

    Clapperton, G. | IET | 2010
    Keywords: security of data
  6.  

    The State vs. the People

    Guarino, A. | IET | 2013
    Keywords: security of data
  7.  

    Improving the Common Vulnerability Scoring System

    Mell, P. / Scarfone, K. | IET | 2007
    Keywords: security of data
  8.  

    The terrors and the errors [cyber-terrorist attack]

    Hayes, J. | IET | 2010
    Keywords: security of data
  9.  

    Unconditionally secure social secret sharing scheme

    Nojoumian, M. / Stinson, D.R. / Grainger, M. | IET | 2010
    Keywords: security of data
  10.  

    The shadownet [World Wide Web]

    Vitaliev, D. | IET | 2010
    Keywords: security of data
  11.  

    Industrial systems: cyber-security's new battlefront

    Piggin, R. | IET | 2014
    Keywords: security of data
  12.  

    Managing Data Integrity

    Lee, Michael / Bieker, Gentry | Wiley | 2011
    Keywords: managing data integrity, data integrity
  13.  

    Fragile Web [Internet security]

    Sandham, D. | IET | 2008
    Keywords: security of data
  14.  

    Refinements of the ALRED construction and MAC security claims

    Daemen, J. / Rijmen, V. | IET | 2010
    Keywords: security of data
  15.  

    Reassuringly expensive

    Edwards, C. | IET | 2010
    Keywords: security of data
  16.  

    Anonymity and security for autonomous mobile agents

    Raji, F. / Tork Ladani, B. | IET | 2010
    Keywords: security of data
  17.  

    Safe as houses [home security]

    Harris, M. | IET | 2010
    Keywords: security of data

Number of results: 10 | 20 | 50