Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Special issue on security and privacy of blockchain technologies
Online Contents | 2020|Keywords: Datensicherung -
Correction to: Science of Cyber Security
Springer Verlag | 2021|Keywords: Systems and Data Security -
A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions
Springer Verlag | 2018|Keywords: Systems and Data Security -
Proactive Secret Sharing with a Dishonest Majority
Springer Verlag | 2016|Keywords: Systems and Data Security -
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups
TIBKAT | 2020|Keywords: Datensicherung -
HBSS: (Simple) Hash-Based Stateless Signatures – Hash All the Way to the Rescue!
(Preliminary Version)Springer Verlag | 2023|Keywords: Systems and Data Security -
Emerging Security Challenges for Ubiquitous Devices
Free accessSpringer Verlag | 2021|Keywords: Systems and Data Security -
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation
Springer Verlag | 2018|Keywords: Systems and Data Security -
Mirrored Commitment: Fixing “Randomized Partial Checking” and Applications
Springer Verlag | 2024|Keywords: Systems and Data Security -
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic
Springer Verlag | 2022|Keywords: Systems and Data Security -
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
Sequential Aggregate Signatures Made Shorter
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
On anonymity metrics for practical anonymous communication protocols
Tema Archive | 2004|Keywords: Datensicherheit -
Towards a Unified Security Model for Physically Unclonable Functions
Springer Verlag | 2016|Keywords: Systems and Data Security -
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Springer Verlag | 2020|Keywords: Systems and Data Security -
Elastic block ciphers: method, security and instantiations
Online Contents | 2009|Keywords: Datensicherung -
Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services
Springer Verlag | 2020|Keywords: Systems and Data Security -
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
Springer Verlag | 2020|Keywords: Systems and Data Security -
Hard Invalidation of Electronic Signatures
Springer Verlag | 2015|Keywords: Systems and Data Security -
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
Springer Verlag | 2016|Keywords: Systems and Data Security -
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs
Springer Verlag | 2018|Keywords: Systems and Data Security -
Linearly Homomorphic Structure-Preserving Signatures and Their Applications
Free accessSpringer Verlag | 2013|Keywords: Systems and Data Security -
Privacy Threats in E-Shopping (Position Paper)
Springer Verlag | 2016|Keywords: Systems and Data Security -
Elastic block ciphers: method, security and instantiations
Online Contents | 2009|Keywords: Datensicherung -
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
Springer Verlag | 2014|Keywords: Systems and Data Security -
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Springer Verlag | 2013|Keywords: Systems and Data Security -
GDPR – Challenges for Reconciling Legal Rules with Technical Reality
Springer Verlag | 2020|Keywords: Systems and Data Security -
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved
Springer Verlag | 2021|Keywords: Systems and Data Security -
Scalable Group Signatures with Revocation
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files
Springer Verlag | 2022|Keywords: Systems and Data Security -
Compactly Hiding Linear Spans
Free accessTightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and ApplicationsSpringer Verlag | 2015|Keywords: Systems and Data Security -
Cliptography: Clipping the Power of Kleptographic Attacks
Springer Verlag | 2016|Keywords: Systems and Data Security -
Order-Preserving Encryption Secure Beyond One-Wayness
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
Fully Dynamic Password Protected Secret Sharing: Simplifying PPSS Operation and Maintenance
Springer Verlag | 2021|Keywords: Systems and Data Security -
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
Free accessSpringer Verlag | 2010|Keywords: Systems and Data Security -
Differentially-Private “Draw and Discard” Machine Learning: Training Distributed Model from Enormous Crowds
Springer Verlag | 2022|Keywords: Systems and Data Security -
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
Free accessSpringer Verlag | 2009|Keywords: Systems and Data Security -
Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)
Springer Verlag | 2008|Keywords: Systems and Data Security -
Group Signatures with Almost-for-Free Revocation
Free accessSpringer Verlag | 2012|Keywords: Systems and Data Security -
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Springer Verlag | 2013|Keywords: Systems and Data Security -
A Little Honesty Goes a Long Way
Free accessThe Two-Tier Model for Secure Multiparty ComputationSpringer Verlag | 2015|Keywords: Systems and Data Security -
On the Evolution of User Authentication: Non-bilateral Factors
Springer Verlag | 2008|Keywords: Systems and Data Security -
On Offline Payments with Bitcoin (Poster Abstract)
Springer Verlag | 2014|Keywords: Systems and Data Security -
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Signatures Resilient to Continual Leakage on Memory and Computation
Free accessSpringer Verlag | 2011|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.