Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
When Do Firms Invest in Privacy-Preserving Technologies?
British Library Conference Proceedings | 2010|Keywords: Security -
Design of Network Topology in an Adversarial Environment
British Library Conference Proceedings | 2010|Keywords: Security -
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
British Library Conference Proceedings | 2010|Keywords: Security -
Uncertainty in Interdependent Security Games
British Library Conference Proceedings | 2010|Keywords: Security -
A Localization Game in Wireless Sensor Networks
British Library Conference Proceedings | 2010|Keywords: Security -
The Password Game: Negative Externalities from Weak Password Practices
British Library Conference Proceedings | 2010|Keywords: Security -
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity
British Library Conference Proceedings | 2010|Keywords: Security -
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
British Library Conference Proceedings | 2010|Keywords: Security -
Disperse or Unite? A Mathematical Model of Coordinated Attack
British Library Conference Proceedings | 2010|Keywords: Security -
Adversarial Control in a Delay Tolerant Network
British Library Conference Proceedings | 2010|Keywords: Security -
Tracking Games in Mobile Networks
British Library Conference Proceedings | 2010|Keywords: Security -
ISPs and Ad Networks against Botnet Ad Fraud
British Library Conference Proceedings | 2010|Keywords: Security -
Robust Control in Sparse Mobile Ad-Hoc Networks
British Library Conference Proceedings | 2010|Keywords: Security -
Optimal Information Security Investment with Penetration Testing
British Library Conference Proceedings | 2010|Keywords: Security -
Towards a Game Theoretic Authorisation Model
British Library Conference Proceedings | 2010|Keywords: Security -
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
British Library Conference Proceedings | 2010|Keywords: Security -
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Analyzing Information Security Awareness through Networks of Association
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Private Searching on MapReduce
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Context-Aware Privacy Design Pattern Selection
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
An Insider Threat Prediction Model
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Attacking Image Recognition Captchas: A Naive but Effective Approach
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Security for Dynamic Service-Oriented eCollaboration: Architectural Alternatives and Proposed Solution
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
An Agent Based Back-End RFID Tag Management System
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Real-Time Remote Attestation with Privacy Protection
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Safe and Efficient Strategies for Updating Firewall Policies
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Mechanizing Social Trust-Aware Recommenders with T-Index Augmented Trustworthiness
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Assessing the Usability of End-User Security Software
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Untraceability and Profiling Are Not Mutually Exclusive
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Building ISMS through the Reuse of Knowledge
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
In Search of Search Privacy
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
A Call Conference Room Interception Attack and its Detection
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Efficiency Improvement Of Homomorphic E-Auction
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Privacy Policy Referencing
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Usage Control, Risk and Trust
British Library Conference Proceedings | 2010|Keywords: Computer security, Security -
Ethical Guidelines for Computer Security Researchers: ``Be Reasonable'' (Panel)
British Library Conference Proceedings | 2010|Keywords: Data security -
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper)
British Library Conference Proceedings | 2010|Keywords: Data security -
Reliable Food Traceability Using RFID Tagging
British Library Conference Proceedings | 2010|Keywords: Data security -
Security Applications of Diodes with Unique Current-Voltage Characteristics
British Library Conference Proceedings | 2010|Keywords: Data security -
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections
British Library Conference Proceedings | 2010|Keywords: Data security -
Practical Private Set Intersection Protocols with Linear Complexity
British Library Conference Proceedings | 2010|Keywords: Data security -
A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys
British Library Conference Proceedings | 2010|Keywords: Data security -
What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions
British Library Conference Proceedings | 2010|Keywords: Data security -
Security Mechanisms with Selfish Players in Wireless Networks
British Library Conference Proceedings | 2010|Keywords: Data security -
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
British Library Conference Proceedings | 2010|Keywords: Data security -
All You Can Eat or Breaking a Real-World Contactless Payment System
British Library Conference Proceedings | 2010|Keywords: Data security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.