Seite 7 von 735.691 Ergebnissen

Sortieren nach: Relevanz | Aktualität | Titel

Treffer filtern

Externe Quellen

Suchen...

Für folgende Begriffe wurden Synonyme verwendet: Sicherheit

Suche ohne Synonyme: keywords:(Sicherheit)

Verwendete Synonyme:

  • safety
  • security
  1.  

    Issues of Flash-Aware Buffer Management for Database Systems

    Ou, Y. / Harder, T. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  2.  

    Test Data Provisioning for Database-Driven Applications

    Haller, K. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  3.  

    Efficient Model Selection for Large-Scale Nearest-Neighbor Data Mining

    Hamerly, G. / Speegle, G. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  4.  

    Risk-Communication Practice with the Public after the Fukushima Power Plant Accident ; The Support and Consultation for the proper recognition about radiation and health

    JAPAN ATOMIC ENERGY Risk Communication Study Office | British Library Conference Proceedings | 2012
    Schlagwörter: Nuclear security, Security
  5.  

    Privacy Supporting Cloud Computing: ConfiChair, a Case Study

    Arapinis, M. / Bursuc, S. / Ryan, M. | British Library Conference Proceedings | 2012
    Schlagwörter: Computer security, Security
  6.  

    Uncertainty in Sequential Pattern Mining

    Muzammal, M. / Raman, R. | British Library Conference Proceedings | 2012
    Schlagwörter: Database security, Data security, Security data
  7.  

    Worldwide cyber security

    East-West Institute | British Library Conference Proceedings | 2012
    Schlagwörter: Cyber security, Security
  8.  

    Prevent Recurrence of Nuclear Disaster(2) ; Reconstruction of Safety Logic Diagram of Nuclear System

    Miyano, H. / Sekimura, N. / Nakamura, T. et al. | British Library Conference Proceedings | 2012
    Schlagwörter: Nuclear security, Security
  9.  

    Revisiting Botnet Models and Their Implications for Takedown Strategies

    Yen, T.-F. / Reiter, M.K. | British Library Conference Proceedings | 2012
    Schlagwörter: Computer security, Security
  10.  

    Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity

    Arapinis, M. / Bursuc, S. / Ryan, M.D. | British Library Conference Proceedings | 2012
    Schlagwörter: Computer security, Security
  11.  

    A Core Calculus for Provenance

    Acar, U.A. / Ahmed, A. / Cheney, J. et al. | British Library Conference Proceedings | 2012
    Schlagwörter: Computer security, Security
  12.  

    Verified Indifferentiable Hashing into Elliptic Curves

    Barthe, G. / Gregoire, B. / Heraud, S. et al. | British Library Conference Proceedings | 2012
    Schlagwörter: Computer security, Security
  13.  

    Analysing Routing Protocols: Four Nodes Topologies Are Sufficient

    Cortier, V. / Degrieck, J. / Delaune, S. | British Library Conference Proceedings | 2012
    Schlagwörter: Computer security, Security
  14.  

    An East Asian security community: Japan, Australia and resources as 'security'

    Weeks, Donna | Taylor & Francis Verlag | 2011
    Schlagwörter: security community, East Asian security, resources security
  15.  

    An architectural systems engineering methodology for addressing cyber security

    Bayuk, Jennifer L. / Horowitz, Barry M. | Wiley | 2011
    Schlagwörter: security architecture, security metrics, systems security
  16.  

    Data and Applications Security: Past, Present and the Future

    Thuraisingham, B. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  17.  

    Persistent versus Dynamic Role Membership

    Bacon, J. / Chadwick, D. W. / Otenko, O. et al. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  18.  

    Systematic Development of a Family of Fair Exchange Protocols

    Ezhilchelvan, P. D. / Shrivastava, S. K. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  19.  

    Secure Authorisation for Web Services

    Indrakanti, S. / Varadharajan, V. / Hitchens, M. et al. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security
  20.  

    Administration Rights in the SDSD-System

    Biskup, J. / Leineweber, T. / Parthe, J. | British Library Conference Proceedings
    Schlagwörter: Database security, Applications security

Ergebnisse anzeigen: 10 | 20 | 50