Katalog der Deutschen Nationalbibliothek


Suchformular zurücksetzen  
 
Expertensuche ?
 
eingeschränkt auf
- Materialarten:  Artikel
- Bestandssichten:  Gesamter Bestand
Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

1 - 10 von 16091
<< < > >>


Online Ressourcen 1 International Emergency Responses: Harmonizing Data Security and Protection Standards for Emergency Medical Teams
Scholtz, Andreas. - Basel : MDPI, 2026
Online Ressource
Artikel 2 Active Electromagnetic Side-Channel Analysis: Crossing Physical Security Boundaries through Impedance Variations
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 3 Coil-Based Detection and Concurrent Error Correction Against EMFI
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 4 Combined Stability: Protecting against Combined Attacks
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 5 Don’t be mean: Reducing Approximation Noise in TFHE through Mean Compensation
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 6 FAST: Fast and Accurate Security Testing of HRP UWB Chips
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 7 Fault Attacks on VOLEitH Signature Schemes
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 8 High Fidelity Security Mesh Monitoring using Low-Cost, Embedded Time Domain Reflectometry
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 9 Keep it Simple: Refreshing the NTT of Kyber’s Decapsulation to Prevent Plaintext-Checking Side-Channel Attacks
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 10 ML-DSA masking sweetened with SUCRE: Shuffle-and-Unmask Countermeasure for REjection sampling
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource


1 - 10 von 16091
<< < > >>


E-Mail-IconAdministration