1–50 of 27,437 hits

Sort by: Relevancy | Date newest | Title A-Z

Filter results

External sources

Searching...

Synonyms were used for: Datensicherheit

Search without synonyms: keywords:(Datensicherheit)

Used synonyms:

  • data integrity
  • data security
  • datenintegritat
  • datensicherung
  • security of data
  1.  

    An efficient data integrity auditing protocol for cloud computing

    Garg, Neenu / Bawa, Seema / Kumar, Neeraj | Elsevier | 2020
    Keywords: Data integrity, Data integrity auditing
  2.  

    For your eyes only?

    Mileham, R. | IET | 2012
    Keywords: security of data
  3.  

    Comparative analysis of cloud data integrity auditing protocols

    Garg, Neenu / Bawa, Seema | Elsevier | 2016
    Keywords: Data integrity, Data integrity auditing
  4.  

    e-doctor's tips

    Vitaliev, D. | IET | 2008
    Keywords: security of data
  5.  

    The terrors and the errors [cyber-terrorist attack]

    Hayes, J. | IET | 2010
    Keywords: security of data
  6.  

    Unconditionally secure social secret sharing scheme

    Nojoumian, M. / Stinson, D.R. / Grainger, M. | IET | 2010
    Keywords: security of data
  7.  

    Mash-up maps [management map data]

    Clapperton, G. | IET | 2010
    Keywords: security of data
  8.  

    Industrial systems: cyber-security's new battlefront

    Piggin, R. | IET | 2014
    Keywords: security of data
  9.  

    The shadownet [World Wide Web]

    Vitaliev, D. | IET | 2010
    Keywords: security of data
  10.  

    Improving the Common Vulnerability Scoring System

    Mell, P. / Scarfone, K. | IET | 2007
    Keywords: security of data
  11.  

    The State vs. the People

    Guarino, A. | IET | 2013
    Keywords: security of data
  12.  

    Fragile Web [Internet security]

    Sandham, D. | IET | 2008
    Keywords: security of data
  13.  

    Reassuringly expensive

    Edwards, C. | IET | 2010
    Keywords: security of data
  14.  

    Refinements of the ALRED construction and MAC security claims

    Daemen, J. / Rijmen, V. | IET | 2010
    Keywords: security of data
  15.  

    Anonymity and security for autonomous mobile agents

    Raji, F. / Tork Ladani, B. | IET | 2010
    Keywords: security of data
  16.  

    Safe as houses [home security]

    Harris, M. | IET | 2010
    Keywords: security of data
  17.  

    Life begins at 45 [mainframe software]

    Eddolls, T. | IET | 2009
    Keywords: security of data
  18.  

    Agent-based honeynet framework for protecting servers in campus networks

    Kim, I.S. / Kim, M.H. | IET | 2012
    Keywords: security of data
  19.  

    Analysis and improvement of a fair remote retrieval protocol for private medical records

    Deng, Jiang / Xu, Chunxiang / Wu, Huai et al. | Wiley | 2016
    Keywords: data integrity
  20.  

    Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions

    Note, Margot | Emerald Group Publishing | 2009
    Keywords: Security of data
  21.  

    Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack

    Yuechuan Wei / Yisheng Rong / Xu An Wang | Online Contents | 2016
    Keywords: Data integrity
  22.  

    Wide band spectroscopic skin detection for contactless hand biometrics

    Ferrer, M.A. / Morales, A. / Travieso, C.M. et al. | IET | 2012
    Keywords: security of data
  23.  

    Have data? Will travel [IT security threat]

    Hayes, J. | IET | 2008
    Keywords: security of data
  24.  

    A farewell to hanging chads [electronic voting]

    Harris, M. | IET | 2010
    Keywords: security of data
  25.  

    Empirical support for the generation of domain-oriented quality models

    Villalba, M.T. / Ferna´ndez-Sanz, L. / Marti´nez, J.J. | IET | 2010
    Keywords: security of data
  26.  

    Separation of Short Time Series of Currents into ''Fluctuations,'' ''Tides,'' and ''Mean'' Flow

    Ann E Gargett / Dana K Savidge | Online Contents | 2016
    Keywords: Data integrity
  27.  

    Proactive service migration for long-running Byzantine fault-tolerant systems

    Zhao, W. / Zhang, H. | IET | 2009
    Keywords: security of data
  28.  

    Open source = open invitation?

    Courtney, M. | IET | 2009
    Keywords: security of data
  29.  

    Security evaluation of biometric authentication systems under real spoofing attacks

    Biggio, B. / Akhtar, Z. / Fumera, G. et al. | IET | 2012
    Keywords: security of data
  30.  

    Quantification of private information leakage from phenotype-genotype data: linking attacks

    Arif Harmanci / Mark Gerstein | Online Contents | 2016
    Keywords: Data integrity
  31.  

    Approach to security assessment of critical infrastructures’ information systems

    Leszczyna, R. / Fovino, I.N. / Masera, M. | IET | 2011
    Keywords: security of data
  32.  

    Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited

    Ji, Yanyan / Shao, Bilin / Chang, Jinyong et al. | Elsevier | 2020
    Keywords: Data integrity
  33.  

    Formal specification scheme for database applications using requirements particle networks

    Vatanawood, Wiwat / Rivepiboon, Wanchai | Emerald Group Publishing | 2002
    Keywords: Data integrity
  34.  

    Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems

    Zhao, Quanyu / Chen, Siyi / Liu, Zheli et al. | Elsevier | 2020
    Keywords: Data integrity checking
  35.  

    UTM or NGFW?

    Online Contents | 2017
    Keywords: Firewalls (Data security)
  36.  

    A context-sensitive service composition framework for dependable service provision in cyber-physical systems

    Tao Wang / Chongli Niu / Lianglun Cheng et al. | Online Contents | 2017
    Keywords: Data security
  37.  

    Recovery of flash memories for reliable mobile storages

    IOS Press | 2010
    Keywords: data integrity
  38.  

    Data Integrity and Availability in Cloud Computing Based on Megastore

    National licence
    Yu, Yue Yue / Qin, Su Quan / Wen, Qiao Yan | Trans Tech Publications | 2013
    Keywords: Data Integrity
  39.  

    Secrets of the data stream [security system]

    Sangani, K. | IET | 2010
    Keywords: security of data
  40.  

    Mining frequent itemsets in the presence of malicious participants

    Sekhavat, Y.A. / Fathian, M. | IET | 2010
    Keywords: security of data
  41.  

    Who owns your personal data?

    Sangani, K. | IET | 2010
    Keywords: security of data
  42.  

    Desktop deduction

    Andrews, C. | IET | 2012
    Keywords: security of data
  43.  

    Integrity as a service for replicated data on the cloud

    Abo‐alian, Alshaimaa / Badr, Nagwa L. / Tolba, M. F. | Wiley | 2017
    Keywords: data integrity
  44.  

    Reversible watermarking resistant to cropping attack

    Weng, S.W. / Zhao, Y. / Pan, J.-S. | IET | 2007
    Keywords: security of data
  45.  

    Cyber security: traditional trust models need a makeover, now

    Konstantas, Johnnie | Online Contents | 2015
    Keywords: Data security
  46.  

    The IT security game

    Edwards, C. | IET | 2009
    Keywords: security of data

Number of results: 10 | 20 | 50

Feedback