Seite 7 von 49.276 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Fair Multi-signature

    Thorncharoensri, P. / Susilo, W. / Mu, Y. | British Library Conference Proceedings | 2015
    Schlagwörter: Computer security, Information security, Security applications
  2.  

    SecaaS Framework and Architecture: A Design of Dynamic Packet Control

    Chau, N.-T. / Nguyen, M.-D. / Jung, S. | British Library Conference Proceedings | 2015
    Schlagwörter: Computer security, Information security, Security applications
  3.  

    New Integrated Long-Term Glimpse of RC4

    Ito, R. / Miyaji, A. | British Library Conference Proceedings | 2015
    Schlagwörter: Computer security, Information security, Security applications
  4.  

    Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption

    Hirano, T. / Hattori, M. / Ito, T. et al. | British Library Conference Proceedings | 2013
    Schlagwörter: Computer security, Security
  5.  

    Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC

    Naito, Y. / Sasaki, Y. / Wang, L. et al. | British Library Conference Proceedings | 2013
    Schlagwörter: Computer security, Security
  6.  

    Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces

    Moreira, J. / Fernandez, M. / Kabatiansky, G. | British Library Conference Proceedings | 2013
    Schlagwörter: Computer security, Security
  7.  

    Risks and responses to universal drinking water security

    Hope, R. / Rouse, M. / University of Oxford | British Library Conference Proceedings | 2013
    Schlagwörter: Water security, Security
  8.  

    Security Systems Engineering

    Jacobs, Stuart | Wiley | 2011
    Schlagwörter: security model, security policy, security process management, security standards, security systems engineering
  9.  

    Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis

    Kim, J.-Y. / Kim, H.-J. | British Library Conference Proceedings | 2015
    Schlagwörter: Computer security, Information security, Security applications
  10.  

    Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction

    Mohaisen, A. / Bhuiyan, M. / Labrou, Y. | British Library Conference Proceedings | 2015
    Schlagwörter: Computer security, Information security, Security applications
  11.  

    Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage

    Matsumoto, S. / Onitsuka, Y. / Kawamoto, J. et al. | British Library Conference Proceedings | 2015
    Schlagwörter: Computer security, Information security, Security applications
  12.  

    Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement

    Renner, R. / Wolf, S. / Wullschleger, J. | British Library Conference Proceedings | 2009
    Schlagwörter: Database security, Computer security
  13.  

    Random Systems: Theory and Applications

    Maurer, U. | British Library Conference Proceedings | 2009
    Schlagwörter: Database security, Computer security
  14.  

    Cryptographic Security of Individual Instances

    Antunes, L. / Laplante, S. / Pinto, A. et al. | British Library Conference Proceedings | 2009
    Schlagwörter: Database security, Computer security
  15.  

    Improvement of Collusion Secure Convolutional Fingerprinting Information Codes

    Tomas-Buliart, J. / Fernandez, M. / Soriano, M. | British Library Conference Proceedings | 2009
    Schlagwörter: Database security, Computer security
  16.  

    Unconditionally Secure Blind Signatures

    Hara, Y. / Seito, T. / Shikata, J. et al. | British Library Conference Proceedings | 2009
    Schlagwörter: Database security, Computer security
  17.  

    Fast and Black-box Exploit Detection and Signature Generation for Commodity Software

    Wang, X. / Li, Z. / Choi, J.Y. et al. | British Library Conference Proceedings | 2009
    Schlagwörter: Computer security, Communications security
  18.  

    One-Round Authenticated Key Exchange without Implementation Trick

    Yoneyama, K. | British Library Conference Proceedings | 2013
    Schlagwörter: Computer security, Security
  19.  

    Statistics on Encrypted Cloud Data

    Tseng, F.-K. / Liu, Y.-H. / Chen, R.-J. et al. | British Library Conference Proceedings | 2013
    Schlagwörter: Computer security, Security
  20.  

    Water security, global change and land-atmosphere feedbacks

    Dadson, S. / Acreman, M. / Harding, R. et al. | British Library Conference Proceedings | 2013
    Schlagwörter: Water security, Security

Ergebnisse anzeigen: 10 | 20 | 50