Page 7 from 49,879 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources

Searching...

Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security
  1.  

    Assured Supraliminal Steganography in Computer Games

    Mosunov, A. / Sinha, V. / Crawford, H. et al. | British Library Conference Proceedings | 2014
    Keywords: Computer security, Information security, Security applications
  2.  

    SoK: Lessons Learned from SSL/TLS Attacks

    Meyer, C. / Schwenk, J. | British Library Conference Proceedings | 2014
    Keywords: Computer security, Information security, Security applications
  3.  

    Some New Weaknesses in the RC4 Stream Cipher

    Lv, J. / Zhang, B. / Lin, D. | British Library Conference Proceedings | 2014
    Keywords: Computer security, Information security, Security applications
  4.  

    Towards Incrementalization of Holistic Hyperproperties

    Milushev, D. / Clarke, D. | British Library Conference Proceedings | 2012
    Keywords: Computer security, Security
  5.  

    Towards Unconditional Soundness: Computationally Complete Symbolic Attacker

    Bana, G. / Comon-Lundh, H. | British Library Conference Proceedings | 2012
    Keywords: Computer security, Security
  6.  

    Security Proof with Dishonest Keys

    Comon-Lundh, H. / Cortier, V. / Scerri, G. | British Library Conference Proceedings | 2012
    Keywords: Computer security, Security
  7.  

    Verification of Security Protocols with Lists: From Length One to Unbounded Length

    Paiola, M. / Blanchet, B. | British Library Conference Proceedings | 2012
    Keywords: Computer security, Security
  8.  

    Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD

    Xie, M. / Hu, J. / Yu, X. et al. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  9.  

    A New Multivariate Based Threshold Ring Signature Scheme

    Zhang, J. / Zhao, Y. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  10.  

    Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework

    Baracaldo, N. / Palanisamy, B. / Joshi, J. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  11.  

    A Proposed Approach to Compound File Fragment Identification

    Nguyen, K. / Tran, D. / Ma, W. et al. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  12.  

    Formal Verification of Finite State Transactional Security Policy

    Rajamanickam, N. / Nadarajan, R. / Elci, A. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  13.  

    iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications

    Li, Y. / Zhang, Y. / Li, J. et al. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  14.  

    psOBJ: Defending against Traffic Analysis with pseudo-Objects

    Tang, Y. / Lin, P. / Luo, Z. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  15.  

    We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous

    Kim, D. / Kim, H. | British Library Conference Proceedings | 2014
    Keywords: Computer security, Information security, Security applications
  16.  

    Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs

    Mohaisen, A. / Hollenbeck, S. | British Library Conference Proceedings | 2014
    Keywords: Computer security, Information security, Security applications
  17.  

    Multi-domain Direct Anonymous Attestation Scheme from Pairings

    Yang, L. / Ma, J. / Wang, W. et al. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  18.  

    A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers

    Datta, P. / Roy, D. / Mukhopadhyay, S. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  19.  

    Rational Secure Two-party Computation in Social Cloud

    Wang, Y. / Liu, Z. / Li, T. et al. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security
  20.  

    Hierarchical Solution for Access Control and Authentication in Software Defined Networks

    Shuangyu, H. / Jianwei, L. / Jian, M. et al. | British Library Conference Proceedings | 2014
    Keywords: Database security, System security, Network security

Number of results: 10 | 20 | 50