Seite 6 von 735.691 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Comparing the Performance of Object and Object Relational Database Systems on Objects of Varying Complexity

    Kalantari, R. / Bryant, C.H. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  2.  

    Trade Linkages to Traditional and Non-Traditional Security: Lessons and Prospects

    Aggarwal, V.K. / Govella, K. | British Library Conference Proceedings | 2013
    Schlagwörter: National security, Security
  3.  

    Trade and Human Security in ASEAN: Toward Deeper Linkage?

    Chow, J.T. | British Library Conference Proceedings | 2013
    Schlagwörter: National security, Security
  4.  

    APEC and Security

    Ravenhill, J. | British Library Conference Proceedings | 2013
    Schlagwörter: National security, Security
  5.  

    A Game-Theoretic Analysis of Cooperation in Anonymity Networks

    Yang, M. / Sassone, V. / Hamadou, S. | British Library Conference Proceedings | 2012
    Schlagwörter: Computer security, Security
  6.  

    A Data Integration Methodology and Architecture with Quality Assessment Functionality

    Wang, J. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  7.  

    Flexible Range Semantic Annotations Based on RDFa

    Navarro-Galindo, J.L. / Jimenez, J.S. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  8.  

    Enabling Decision Tree Classification in Database Systems through Pre-computation

    Rehman, N.U. / Scholl, M.H. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  9.  

    Defining Spatio-Temporal Granularities for Raster Data

    Pozzani, G. / Zimanyi, E. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  10.  

    Bilateral Trade Agreements and Human Security in Asia

    Yamada, A. | British Library Conference Proceedings | 2013
    Schlagwörter: National security, Security
  11.  

    The Shanghai Cooperation Organization: The Security-Economics Nexus

    Wan, M. | British Library Conference Proceedings | 2013
    Schlagwörter: National security, Security
  12.  

    Global Trade Linkages: National Security and Human Security

    Vogel, D. | British Library Conference Proceedings | 2013
    Schlagwörter: National security, Security
  13.  

    Uncertainty in Sequential Pattern Mining

    Muzammal, M. / Raman, R. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  14.  

    Sicherheit : ein (un)stillbares Grundbedürfnis

    Frevel, Bernhard | TIBKAT | 2016
    Schlagwörter: Sicherheit, Innere Sicherheit
  15.  

    The Economy-Security Nexus in East Asian FTAs

    Lee, S. | British Library Conference Proceedings | 2013
    Schlagwörter: National security, Security
  16.  

    FlexFlow: A Flexible Flow Control Policy Specification Framework

    Chen, S. / Wijesekera, D. / Jajodia, S. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  17.  

    Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses

    Lin, T. Y. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  18.  

    ECPV: Efficient Certificate Path Validation in Public-key Infrastructure

    Halappanavar, M. / Mukkamala, R. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  19.  

    Modifying LDAP to Support PKI

    Chadwick, D. W. / Ball, E. / Sahalayev, M. V. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  20.  

    Anti-Tamper Databases: Querying Encrypted Databases

    Ozsoyoglu, G. / Singer, D. A. / Chung, S. S. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security

Ergebnisse anzeigen: 10 | 20 | 50