Year of publication
Type of media
Source
Type of material
Licence
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Electronic Documents Related to the Swedish EDI-System for Customs Authorities
British Library Conference Proceedings | 1992|Keywords: data security -
EEC Law and Policy in Telecommunications
British Library Conference Proceedings | 1992|Keywords: data security -
Third Party Services and the Concept of Negotiability
British Library Conference Proceedings | 1992|Keywords: data security -
How to Advance Computer Security by Legal Instruments?
British Library Conference Proceedings | 1992|Keywords: data security -
Data Security in Computer Networks and Legal Problems
British Library Conference Proceedings | 1992|Keywords: data security -
International and National Legislation on EDI
British Library Conference Proceedings | 1992|Keywords: data security -
Open Societies - Closed Networks?
British Library Conference Proceedings | 1992|Keywords: data security -
EDI and National Legislation
British Library Conference Proceedings | 1992|Keywords: data security -
BitIodine: Extracting Intelligence from the Bitcoin Network
British Library Conference Proceedings | 2014|Keywords: Data security -
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing
British Library Conference Proceedings | 2014|Keywords: Data security -
F&E-Vorhaben in Deutschland
British Library Conference Proceedings | 1994|Keywords: datensicherheit -
TeleSec - das Sicherheitsdienstleistungsangebot der TELEKOM
British Library Conference Proceedings | 1994|Keywords: datensicherheit -
Mixcoin: Anonymity for Bitcoin with Accountable Mixes
British Library Conference Proceedings | 2014|Keywords: Data security -
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
British Library Conference Proceedings | 2014|Keywords: Data security -
Privacy Preserving Tatonnement: A Cryptographic Construction of an Incentive Compatible Market
British Library Conference Proceedings | 2014|Keywords: Data security -
MoP-2-MoP - Mobile Private Microblogging
British Library Conference Proceedings | 2014|Keywords: Data security -
On the (In)Security of Mobile Two-Factor Authentication
British Library Conference Proceedings | 2014|Keywords: Data security -
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
British Library Conference Proceedings | 2014|Keywords: Data security -
Garbled Searchable Symmetric Encryption
British Library Conference Proceedings | 2014|Keywords: Data security -
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
British Library Conference Proceedings | 2014|Keywords: Data security -
Practical Secure Decision Tree Learning in a Teletreatment Application
British Library Conference Proceedings | 2014|Keywords: Data security -
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security
British Library Conference Proceedings | 2014|Keywords: Data security -
Informationssieherheit in Unternehmen - Das Beispel BMW
British Library Conference Proceedings | 1994|Keywords: datensicherheit -
Geraete fuer die End-zu-Ende-Verschluesselung
British Library Conference Proceedings | 1994|Keywords: datensicherheit -
Denkansaetze und Methoden der Kryptologie
British Library Conference Proceedings | 1994|Keywords: datensicherheit -
Konfliktbewaeltigung im Unternehmen bei der Einfuehrung neuer Kommunikations-und Informationssysteme
British Library Conference Proceedings | 1994|Keywords: datensicherheit -
Confidentiality Issues on a GPU in a Virtualized Environment
British Library Conference Proceedings | 2014|Keywords: Data security -
On the Awareness, Control and Privacy of Shared Photo Metadata
British Library Conference Proceedings | 2014|Keywords: Data security -
A Secure Data Deduplication Scheme for Cloud Storage
British Library Conference Proceedings | 2014|Keywords: Data security -
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites
British Library Conference Proceedings | 2014|Keywords: Data security -
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
British Library Conference Proceedings | 2014|Keywords: Data security -
Estimating Systematic Risk in Real-World Networks
British Library Conference Proceedings | 2014|Keywords: Data security -
Elliptic Curve Cryptography in Practice
British Library Conference Proceedings | 2014|Keywords: Data security -
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes
British Library Conference Proceedings | 2014|Keywords: Data security -
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users
British Library Conference Proceedings | 2014|Keywords: Data security -
A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates
British Library Conference Proceedings | 2014|Keywords: Data security -
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores
British Library Conference Proceedings | 2014|Keywords: Data security -
Scaling Private Set Intersection to Billion-Element Sets
British Library Conference Proceedings | 2014|Keywords: Data security -
Datensicherheit in Chipkarten - Schluessel zu neuen Applikationen
British Library Conference Proceedings | 1994|Keywords: datensicherheit -
Identifying Risk Factors for Webserver Compromise
British Library Conference Proceedings | 2014|Keywords: Data security -
Challenges in Protecting Tor Hidden Services from Botnet Abuse
British Library Conference Proceedings | 2014|Keywords: Data security -
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
British Library Conference Proceedings | 2014|Keywords: Data security -
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages
British Library Conference Proceedings | 2014|Keywords: Data security -
Digital Check Forgery Attacks on Client Check Truncation Systems
British Library Conference Proceedings | 2014|Keywords: Data security -
Sample or Random Security - A Security Model for Segment-Based Visual Cryptography
British Library Conference Proceedings | 2014|Keywords: Data security -
Security Protocols and Evidence: Where Many Payment Systems Fail
British Library Conference Proceedings | 2014|Keywords: Data security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.