Year of publication
Type of media
Type of material
Licence
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
وضعیت امنیت اطلاعات در سیستمهای اطلاعات بیمارستانی
Free accessDOAJ | 2013|Keywords: Data Security -
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
Online Contents | 2017|Keywords: Datensicherung -
Zheng and Seberry’s public key encryption scheme revisited
Online Contents | 2003|Keywords: Datensicherung -
"Zero Cost'' Majority Attacks on Permissionless Blockchains
TIBKAT | 2023|Keywords: Datensicherheit -
Zagrożenia typu Distributed Denial of Service jako przykład ryzyka związanego z prowadzeniem działalności gospodarczej w internecie
Free accessDOAJ | 2017|Keywords: data security -
Your mission is to turn spies into special agents (how UK brands have experienced hacking security breaches as a form of consumer espionage)
Emerald Group Publishing | 2011Keywords: Data security -
You click, I steal: analyzing and detecting click hijacking attacks in web pages
Online Contents | 2018|Keywords: Datensicherung -
YAZICI STEGANOGRAFİSİ VE SARI NOKTA ANALİZİNİN GÜNÜMÜZDE GEÇERLİLİĞİ
Free accessDOAJ | 2020|Keywords: data security -
Yantramanav: a humanoid to spread literacy among rural children through eGurukul education system
Springer Verlag | 2022|Keywords: Systems and Data Security -
Y2K: is there a lesson in the bug that did not bite?
Emerald Group Publishing | 2008|Keywords: Data security -
XML security protection scheme based on Kerberos authentication and polynomials authorization
Free accessDOAJ | 2020|Keywords: data security -
WShare: an instant secure collaboration workspace over ad hoc wireless LAN
Emerald Group Publishing | 2009|Keywords: Data Security -
WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING
Free accessDOAJ | 2015|Keywords: Data Security -
Write-only oblivious RAM-based privacy-preserved access of outsourced data
Online Contents | 2016|Keywords: Datensicherung -
Withdrawing a declaration of will
Towards a framework for digital signature revocationEmerald Group Publishing | 2005|Keywords: Data security -
Wissensaustausch in Unternehmen: Wahrnehmung von Enterprise Social Software als Tool für den Austausch von sicherheitsrelevantem Wissen
Springer Verlag | 2019|Keywords: Data Security -
Wireline communication: the backbone of data transfer
Springer Verlag | 2020|Keywords: Systems and Data Security -
Wireless sensor networks: a review of motes, wireless technologies, routing algorithms and static deployment strategies for agriculture applications
Springer Verlag | 2020|Keywords: Systems and Data Security -
Wireless Router Placements for Long-Distance Communications in MoCs
Springer Verlag | 2023|Keywords: Systems and Data Security -
Window of exposure - a real problem for SCADA systems? : recommendations for Europe on SCADA patching
Free accessTIBKAT | 2013|Keywords: Datensicherung -
Will self-regulation work in protecting online privacy?
Emerald Group Publishing | 2003|Keywords: Data security -
Wi-Fi protected access for secure power network protection scheme
Elsevier | 2012|Keywords: Data security -
Wide band spectroscopic skin detection for contactless hand biometrics
IET | 2012|Keywords: security of data -
Who should own the data? The impact of data value creation on data ownership
Elsevier | 2024|Keywords: Data security investment -
Who am I, and where's my money? Issues in online security
Emerald Group Publishing | 2007|Keywords: Data security -
Whispering Devices: A Survey on How Side-channels Lead to Compromised Information
Springer Verlag | 2021|Keywords: Systems and Data Security -
Which Category Is Better: Benchmarking Relational and Graph Database Management Systems
Free accessSpringer Verlag | 2019|Keywords: Systems and Data Security -
Where security feeds value (how information security can improve profitability)
Emerald Group Publishing | 2010|Keywords: Data security -
When Research Topic Trend Prediction Meets Fact-Based Annotations
Free accessSpringer Verlag | 2022|Keywords: Systems and Data Security -
When is a law firm liable for a data breach? An exploration into the legal liability of ransomware and cybersecurity
Emerald Group Publishing | 2023|Keywords: Data security laws -
When Intrusion Detection Meets Blockchain Technology: A Review
Free accessBASE | 2018|Keywords: Security of data -
What’s Next? A Recommendation System for Industrial Training
Free accessSpringer Verlag | 2018|Keywords: Systems and Data Security -
What is the Value of Experimentation and Measurement?
Free accessQuantifying the Value and Risk of Reducing Uncertainty to Make Better DecisionsSpringer Verlag | 2020|Keywords: Systems and Data Security -
What influences employees to follow security policies?
Elsevier | 2021|Keywords: Data Security Behaviour -
What Every Librarian Should Know about Electronic Privacy
Emerald Group Publishing | 2009|Keywords: Data security -
What Every Librarian Should Know about Electronic Privacy
Emerald Group Publishing | 2009|Keywords: Data security -
Welcome Message from DSE Managing Editor
Free accessSpringer Verlag | 2016|Keywords: Systems and Data Security -
Web access monitoring mechanism via Android WebView for threat analysis
Free accessOnline Contents | 2021|Keywords: Datensicherung -
Watermarking protocols: an excursus to motivate a new approach
Online Contents | 2017|Keywords: Datensicherung -
Watermarking approach based on Hermite transform and a sliding window algorithm
Springer Verlag | 2023|Keywords: Medical data security -
Watching the watchers: “voluntary monitoring” of infosec employees
Emerald Group Publishing | 2010|Keywords: Data security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.