Year of publication
Type of media
Source
Subject
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
The effect of field data integrity on failure reproduction and fault isolation
IET Digital Library Archive | 2004|Keywords: field data integrity, data integrity -
Information assurance in a rapidly changing environment
IET Digital Library Archive | 2005|Keywords: security of data -
You've got mail - and a whole bunch of issues
IET Digital Library Archive | 2006|Keywords: data security, security of data -
Infamous five: IT security's most overlooked
IET Digital Library Archive | 2006|Keywords: security of data -
Security in SCADA systems: how to handle the growing menace to process automation
IET Digital Library Archive | 2005|Keywords: security of data -
Efficient cheater identification method for threshold schemes
IET Digital Library Archive | 1997|Keywords: security of data -
Efficient identity-based multicast scheme from bilinear pairing
IET Digital Library Archive | 2005|Keywords: data integrity service, data integrity -
Protect and survive [data protection]
IET Digital Library Archive | 2005|Keywords: security of data -
The storage burden [IT security policies]
IET Digital Library Archive | 2006|Keywords: security of data -
The requirements of the Data Protection Act 1998
IET Digital Library Archive | 2006|Keywords: security of data -
Comment on Lin–Wu (t, n)-threshold verifiable multisecret sharing scheme
IET Digital Library Archive | 2001|Keywords: security of data -
(t, n) threshold verifiable multisecret sharing scheme based on the factorisation intractability and discrete logarithm modulo a composite problems
IET Digital Library Archive | 1999|Keywords: security of data -
Ideal secret sharing schemes with multipartite access structures
IET Digital Library Archive | 2006|Keywords: security of data -
Data privacy: fiction or reality? How much privacy are individuals entitled to under the law
IET Digital Library Archive | 2006|Keywords: security of data -
SCADA system security threats, vulnerabilities and solutions
IET Digital Library Archive | 2004|Keywords: security of data -
Synchronisation of hyperchaotic oscillators using a scalar signal
IET Digital Library Archive | 1998|Keywords: security of data -
V-fairness (t, n) secret sharing scheme
IET Digital Library Archive | 1997|Keywords: security of data -
Security of distributed control systems: the concern increases
IET Digital Library Archive | 2005|Keywords: security of data -
Anomaly intrusion detection method based on HMM
IET Digital Library Archive | 2002|Keywords: security of data -
Filling missing temperature values in weather data banks
IET Digital Library Archive | 2006|Keywords: data integrity -
Archive drive [business data storage]
IET Digital Library Archive | 2005|Keywords: security of data -
Protecting personal space intelligently in collaborative virtual environments
IET Digital Library Archive | 2005|Keywords: security of data -
An extensive approach to risk analysis for countermeasures definition
IET Digital Library Archive | 1997|Keywords: security of data -
Authenticated encryption schemes with low communication costs
IET Digital Library Archive | 1994|Keywords: data security -
Robust sinusoidal watermark for images
IET Digital Library Archive | 1999|Keywords: security of data -
Using threats to demonstrate the elements of information security
IET Digital Library Archive | 1995|Keywords: data integrity, security of data -
Protecting the integrity of a sequence of images
IET Digital Library Archive | 1997|Keywords: data integrity -
Beyond control [automation system security]
IET Digital Library Archive | 2005|Keywords: security of data -
A novel watermark embedding and detection scheme for images in DFT domain
IET Digital Library Archive | 1999|Keywords: security of data -
The technology works - the law doesn't: legal aspects of secure electron commerce
IET Digital Library Archive | 1998|Keywords: data integrity -
The four phases of security
IET Digital Library Archive | 2005|Keywords: data integrity, security of data -
Process control security - the BP experience
IET Digital Library Archive | 2005|Keywords: security of data -
PCI DSS - closing the loop on 'card not present' fraud
IET Digital Library Archive | 2006|Keywords: payment card industry data security standard -
Corporate risk analysis and management strategies
IET Digital Library Archive | 1995|Keywords: security of data
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.