
Corona virus: Access only with medical mouth-nose protection, reading rooms open only for LUH members
Please respect the known hygiene rules and prevent long stays in the library!
► More information about opening hours and visiting the library you find in our FAQ
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
An Intranet-based approach to raising information security awareness
IET Digital Library Archive | 2005|Keywords: security of data -
The effect of field data integrity on failure reproduction and fault isolation
IET Digital Library Archive | 2004|Keywords: data integrity, field data integrity -
Information assurance in a rapidly changing environment
IET Digital Library Archive | 2005|Keywords: security of data -
An introduction to JPEG 2000 and watermarking
IET Digital Library Archive | 2000|Keywords: security of data -
Infamous five: IT security's most overlooked
IET Digital Library Archive | 2006|Keywords: security of data -
You've got mail - and a whole bunch of issues
IET Digital Library Archive | 2006|Keywords: security of data, data security -
Managing vulnerabilities in open source software
IET Digital Library Archive | 2005|Keywords: security of data -
Cyber security and implications for national infrastructure
IET Digital Library Archive | 2005|Keywords: security of data -
eProduct security, compliance & risk
IET Digital Library Archive | 2006|Keywords: security of data -
Ensuring real-time data integrity in networked applications
IET Digital Library Archive | 2005|Keywords: data integrity, real-time data integrity -
Protecting the integrity of a sequence of images
IET Digital Library Archive | 1997|Keywords: data integrity -
Vista vision [Microsoft Windows Vista]
IET Digital Library Archive | 2007|Keywords: security of data -
Is your system really safe, secure and reliable enough?
IET Digital Library Archive | 2005|Keywords: security of data -
Using trusted computing to build a safer world
IET Digital Library Archive | 2006|Keywords: security of data -
Digital document integrity
IET Digital Library Archive | 2000|Keywords: data integrity, security of data -
Building up active-defending security assurance framework for e-commerce
IET Digital Library Archive | 2006|Keywords: security of data -
Efficient cheater identification method for threshold schemes
IET Digital Library Archive | 1997|Keywords: security of data -
Efficient identity-based multicast scheme from bilinear pairing
IET Digital Library Archive | 2005|Keywords: data integrity, data integrity service -
Regulating enterprise IT [IT security]
IET Digital Library Archive | 2007|Keywords: security of data -
The storage burden [IT security policies]
IET Digital Library Archive | 2006|Keywords: security of data -
Information warfare: battles in cyberspace
IET Digital Library Archive | 2001|Keywords: security of data -
The requirements of the Data Protection Act 1998
IET Digital Library Archive | 2006|Keywords: security of data -
Identification scheme based on quadratic residue
IET Digital Library Archive | 1998|Keywords: security of data -
Image encryption by using fractional Fourier transform and jigsaw transform in image bit planes
SPIE | 2005|Keywords: data security -
A new trust-based electronic exchange system
IET Digital Library Archive | 2006|Keywords: security of data -
Comment on Lin–Wu (t, n)-threshold verifiable multisecret sharing scheme
IET Digital Library Archive | 2001|Keywords: security of data -
Attack on server assisted authentication protocols
IET Digital Library Archive | 1992|Keywords: security of data -
Common issues for remote analysis and adaptive security
IET Digital Library Archive | 2004|Keywords: security of data -
Security skills: aptly qualified or merely mollified?
IET Digital Library Archive | 2006|Keywords: security of data -
Protect and survive [data protection]
IET Digital Library Archive | 2005|Keywords: security of data -
Security in SCADA systems: how to handle the growing menace to process automation
IET Digital Library Archive | 2005|Keywords: security of data -
Security frame and evaluation in mobile agent system
IET Digital Library Archive | 2005|Keywords: security of data -
Security and trust management in mobile agents: a new perspective
IET Digital Library Archive | 2005|Keywords: security of data -
Human behavior analysis and its application to a pervasive computing security system
IET Digital Library Archive | 2006|Keywords: security of data -
How to prevent cheating in Pinch's scheme
IET Digital Library Archive | 1997|Keywords: security of data -
Control systems cyber security - understanding the issues and addressing them
IET Digital Library Archive | 2005|Keywords: security of data