Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Zwei-Faktor-Authentifizierung für LDAP: Der privacyIDEA LDAP-Proxy
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
ZombieLoad Attack: Leaking Your Recent Memory Operations on Intel CPUs
Conference/TalkTIB AV-Portal | 2019|Keywords: Security -
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet: Finding interesting targets in 128bit of entropy
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Where in the World Is Carmen Sandiego?: Becoming a secret travel agent
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Wheel of Fortune: Analyzing Embedded OS Random Number Generators
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
What The Fax?!: Hacking your network likes it's 1980 again
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
What's up in the land of the Linux kernel security?
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
What Price the Upload Filter?: The history and costs of government exceptional access
Conference/TalkTIB AV-Portal | 2020|Keywords: IT-Security -
What could possibly go wrong with ?: Side effects include side-channel attacks and bypassing kernel ASLR
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
We should share our secrets: Shamir secret sharing: How it works and how to implement it
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Web-based Cryptojacking in the Wild: When your browser is mining coins for other people
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Watching the Watchers - How Surveillance Companies track you using Mobile Networks: Real life experiences from the Location Tracking Wars
Conference/TalkTIB AV-Portal | 2020|Keywords: IT-Security -
Wallet Security: How (not) to protect private keys
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
wallet.fail: Hacking the most popular cryptocurrency hardware wallets
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Voting Village - The DARPA SSITH Program at DEFCON
Conference/TalkTIB AV-Portal | 2019|Keywords: System Security Integrated Through Hardware (SSITH) -
Viva la Vita Vida: Hacking the most secure handheld console
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Visiting The Bear Den: A Journey in the Land of (Cyber-)Espionage
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Virtual Secure Boot: Secure Boot support in qemu, kvm and ovmf.
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Venenerkennung hacken: Vom Fall der letzten Bastion biometrischer Systeme
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Vehicle immobilization revisited: Uncovering and assessing a second authentication mechanism in modern vehicle immobilization systems
Conference/TalkTIB AV-Portal | 2019|Keywords: Security -
User Session Recording for the Enterprise: An Open-Source Effort by Red Hat
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Untrusting the CPU: A proposal for secure computing in an age where we cannot trust our CPUs anymore
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Uncover, Understand, Own - Regaining Control Over Your AMD CPU
Conference/TalkTIB AV-Portal | 2019|Keywords: Security -
Uncovering vulnerabilities in Hoermann BiSecur: An AES encrypted radio system
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Type confusion: discovery, abuse, and protection
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
TrustZone is not enough: Hijacking debug components for embedded security
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Truly cardless: Jackpotting an ATM using auxiliary devices.
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Towards a more secure operating system without sacrificing usability: The GNOME challenge
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
The sustainability of safety, security and privacy
Conference/TalkTIB AV-Portal | 2019|Keywords: Security -
The Rocky Road to TLS 1.3 and better Internet Encryption
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
The Layman's Guide to Zero-Day Engineering: A demystification of the exploit development lifecycle
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
The Great Escape of ESXi: Breaking Out of a Sandboxed Virtual Machine
Conference/TalkTIB AV-Portal | 2019|Keywords: Security -
The DROWN Attack: Breaking TLS using SSLv2
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
TamaGo - bare metal Go framework for ARM SoCs.: Reducing the attack surface with pure embedded Go.
Conference/TalkTIB AV-Portal | 2019|Keywords: Security -
Talking Behind Your Back: On the Privacy & Security of the Ultrasound Tracking Ecosystem
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Tales of old: untethering iOS 11: Spoiler: Apple is bad at patching
Conference/TalkTIB AV-Portal | 2019|Keywords: Security -
Taking a scalpel to QNX: Analyzing & Breaking Exploit Mitigations and Secure Random Number Generators on QNX 6.6 and 7.0
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Squeezing a key through a carry bit: No bug is small enough
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Sneaking In Network Security: Enforcing strong network segmentation, without anyone noticing
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
SiliVaccine: North Korea's Weapon of Mass Detection: How I Learned to Stop Worrying and Love the Backdoor
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
SigOver + alpha: Signal overshadowing attack on LTE and its applications
Conference/TalkTIB AV-Portal | 2019|Keywords: Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.