1–50 of 299 hits

Sort by: Relevancy | Date newest | Title A-Z

Synonyms were used for: Datensicherheit

Search without synonyms: keywords:(Datensicherheit)

Used synonyms:

  • data integrity
  • data security
  • datenintegritat
  • datensicherung
  • security of data
  1.  

    An Intranet-based approach to raising information security awareness

    Smith, M. | IET Digital Library Archive | 2005
    Keywords: security of data
  2.  

    Group discipline [data protection]

    Cater, N. | IET Digital Library Archive | 2007
    Keywords: security of data
  3.  

    Threshold proxy signatures

    Sun, H. -M. / Lee, N. -Y. / Hwang, T. | IET Digital Library Archive | 1999
    Keywords: security of data
  4.  

    The effect of field data integrity on failure reproduction and fault isolation

    Hardojo, M. / Elbaum, S. / Zhimin Wang | IET Digital Library Archive | 2004
    Keywords: data integrity, field data integrity
  5.  

    Information assurance in a rapidly changing environment

    Martin, D. | IET Digital Library Archive | 2005
    Keywords: security of data
  6.  

    An introduction to JPEG 2000 and watermarking

    Clark, R. | IET Digital Library Archive | 2000
    Keywords: security of data
  7.  

    Infamous five: IT security's most overlooked

    Cluley, G. | IET Digital Library Archive | 2006
    Keywords: security of data
  8.  

    The millennium bug

    Ainsworth, P. | IET Digital Library Archive | 1996
    Keywords: data integrity
  9.  

    You've got mail - and a whole bunch of issues

    Gothard, A. | IET Digital Library Archive | 2006
    Keywords: security of data, data security
  10.  

    Managing vulnerabilities in open source software

    Cox, M. | IET Digital Library Archive | 2005
    Keywords: security of data
  11.  

    Cyber security and implications for national infrastructure

    Davis, P. | IET Digital Library Archive | 2005
    Keywords: security of data
  12.  

    eProduct security, compliance & risk

    King, S. | IET Digital Library Archive | 2006
    Keywords: security of data
  13.  

    Clunk click, every trip

    Mercer, E. | IET Digital Library Archive | 1998
    Keywords: security of data
  14.  

    Is RFID automating crime?

    Sparkes, M. | IET Digital Library Archive | 2006
    Keywords: security of data
  15.  

    Safety management of data

    Faulkner, A. | IET Digital Library Archive | 2006
    Keywords: security of data
  16.  

    Ensuring real-time data integrity in networked applications

    Hunt, G. | IET Digital Library Archive | 2005
    Keywords: data integrity, real-time data integrity
  17.  

    Protecting the integrity of a sequence of images

    Amornraksa, T. / Sweeney, P. / Honary, B. | IET Digital Library Archive | 1997
    Keywords: data integrity
  18.  

    Vista vision [Microsoft Windows Vista]

    Jones, T. | IET Digital Library Archive | 2007
    Keywords: security of data
  19.  

    Is your system really safe, secure and reliable enough?

    Hoogenboom, P. | IET Digital Library Archive | 2005
    Keywords: security of data
  20.  

    Usage and abusage [Internet use]

    IET Digital Library Archive | 2007
    Keywords: security of data
  21.  

    Using trusted computing to build a safer world

    Sadler, M. | IET Digital Library Archive | 2006
    Keywords: security of data
  22.  

    Securing removable media

    Ahlberg, M. | IET Digital Library Archive | 2005
    Keywords: security of data
  23.  

    RFID security

    Royston, P. | IET Digital Library Archive | 2006
    Keywords: security of data
  24.  

    Digital document integrity

    Shaw, G. | IET Digital Library Archive | 2000
    Keywords: data integrity, security of data
  25.  

    Building up active-defending security assurance framework for e-commerce

    Yali Mu / Changxiang Shen | IET Digital Library Archive | 2006
    Keywords: security of data
  26.  

    Efficient cheater identification method for threshold schemes

    Chang, C.-C. / Hwang, R.-J. | IET Digital Library Archive | 1997
    Keywords: security of data
  27.  

    Efficient identity-based multicast scheme from bilinear pairing

    Wang, L. / Wu, C.-K. | IET Digital Library Archive | 2005
    Keywords: data integrity, data integrity service
  28.  

    Regulating enterprise IT [IT security]

    Knight, W. | IET Digital Library Archive | 2007
    Keywords: security of data
  29.  

    The storage burden [IT security policies]

    Knights, M. | IET Digital Library Archive | 2006
    Keywords: security of data
  30.  

    Information warfare: battles in cyberspace

    Overill, R.E. | IET Digital Library Archive | 2001
    Keywords: security of data
  31.  

    The requirements of the Data Protection Act 1998

    Room, S. / Cohen, R. | IET Digital Library Archive | 2006
    Keywords: security of data
  32.  

    Sharing information with less risk!

    Lamb, S. | IET Digital Library Archive | 2006
    Keywords: security of data
  33.  

    Identification scheme based on quadratic residue

    Chen | IET Digital Library Archive | 1998
    Keywords: security of data
  34.  

    Image encryption by using fractional Fourier transform and jigsaw transform in image bit planes

    Sinha , Aloka / Singh, Kehar | SPIE | 2005
    Keywords: data security
  35.  

    Paper defence [security]

    Marsh, P. | IET Digital Library Archive | 2005
    Keywords: security of data
  36.  

    A new trust-based electronic exchange system

    Yichun Liu | IET Digital Library Archive | 2006
    Keywords: security of data
  37.  

    Comment on Lin–Wu (t, n)-threshold verifiable multisecret sharing scheme

    He, W.-H. / Wu, T.-S. | IET Digital Library Archive | 2001
    Keywords: security of data
  38.  

    Digital territories

    Daskala, B. / Maghiros, I. | IET Digital Library Archive | 2006
    Keywords: security of data
  39.  

    Attack on server assisted authentication protocols

    Anderson, R.J. | IET Digital Library Archive | 1992
    Keywords: security of data
  40.  

    Common issues for remote analysis and adaptive security

    Heimbigner, D. | IET Digital Library Archive | 2004
    Keywords: security of data
  41.  

    Security skills: aptly qualified or merely mollified?

    Marsh, P. | IET Digital Library Archive | 2006
    Keywords: security of data
  42.  

    Protect and survive [data protection]

    Gothard, A. | IET Digital Library Archive | 2005
    Keywords: security of data
  43.  

    Security in SCADA systems: how to handle the growing menace to process automation

    Brown, T. | IET Digital Library Archive | 2005
    Keywords: security of data
  44.  

    Security frame and evaluation in mobile agent system

    Suzhen Wang / Jianli Hu / Aizhen Liu et al. | IET Digital Library Archive | 2005
    Keywords: security of data
  45.  

    The spy on the LAN

    Vogel, S. | IET Digital Library Archive | 2005
    Keywords: security of data
  46.  

    Cyber security threat management

    Kawano, K. | IET Digital Library Archive | 2005
    Keywords: security of data
  47.  

    Security and trust management in mobile agents: a new perspective

    Ching Lin / Varadharajan, V. / Yan Wang et al. | IET Digital Library Archive | 2005
    Keywords: security of data
  48.  

    Human behavior analysis and its application to a pervasive computing security system

    Yun Yuan / Zhenjiang Miao / Shaohai Hu | IET Digital Library Archive | 2006
    Keywords: security of data
  49.  

    How to prevent cheating in Pinch's scheme

    Ghodosi, H. / Pieprzyk, J. / Chaudhry, G.R. et al. | IET Digital Library Archive | 1997
    Keywords: security of data
  50.  

    Control systems cyber security - understanding the issues and addressing them

    Tritschler, M. | IET Digital Library Archive | 2005
    Keywords: security of data

Number of results: 10 | 20 | 50

Feedback