Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
communication system security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/174)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A secure data infrastructure for personal manufacturing based on a novel key-less, byte-less encryption method
Vedešin, Anton
;
Dogru, John Mehmet Ulgar
;
Liiv, Innar
;
Ben Yahia, Sadok
;
Draheim, Dirk
IEEE Access
2020
/
p. 40039-40056 : ill
https://doi.org/10.1109/ACCESS.2019.2946730
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
172
1.
communication system security
2.
comprehensive system of economic security
3.
power system security
4.
system of economic security
5.
system security
6.
transmission System Security
7.
air-ground communication
8.
air-to-ground communication
9.
ambient backscatter communication
10.
automotive communication networks
11.
best-effort communication
12.
body-to-body communication
13.
communication
14.
communication business processes
15.
communication channels (information theory)
16.
communication delay
17.
communication delay time
18.
communication delays
19.
communication geography
20.
communication in PMS
21.
communication model
22.
communication networks
23.
communication overheads
24.
communication systems
25.
communication technology
26.
communication-time circuits
27.
communication-time processing
28.
cooperative communication
29.
crisis communication
30.
critical communication
31.
cross-border communication networks
32.
cross-cultural communication
33.
cyber team communication
34.
cyber threat communication
35.
D2D communication
36.
device-to-device (D2D) communication
37.
device-to-device communication
38.
digital communication
39.
digital scholarly communication
40.
electronic cross-communication
41.
electronic scholary communication
42.
embryo-maternal communication
43.
guaranteed-throughput communication
44.
health communication
45.
ICT (information and communication technology)
46.
indoor communication
47.
information and communication technologies
48.
Information and communication technologies (ICT) digitalisation
49.
Information and Communication Technologies (ICT) laws
50.
Information and Communication Technologies (ICTs)
51.
Information and Communication Technologies for Development
52.
information and communication technology
53.
information and communication technology (ICT)
54.
information communication technology
55.
intercellular communication
56.
intercultural communication
57.
marketing communication
58.
massive machine-type communication (mMTC)
59.
massive machinetype communication (MMTC)
60.
mobile communication
61.
network communication technologies
62.
nonverbal communication
63.
on-chip communication architectures
64.
online word-of mouth (WOM) communication
65.
online word-of-mouth communication
66.
optical communication equipment
67.
patient-physician communication
68.
personalized communication
69.
person-communication technology interface
70.
pervasive public safety communication
71.
pervasive public safety communication (PPSC)
72.
post-Shannon communication
73.
power line communication
74.
powerline communication
75.
quantum communication
76.
quantum communication chanell
77.
radio communication
78.
random communication delays
79.
real-time communication
80.
remote communication
81.
responsive communication jamming
82.
scalable communication
83.
scholarly communication
84.
service communication
85.
strategic communication
86.
ultra-reliable lowlatency communication (URLLC)
87.
use-development communication
88.
user-developer communication
89.
wireless communication
90.
visual communication
91.
VoIP communication
92.
5G mobile communication
93.
5G mobile communication systems
94.
ad-hoc sensor networks security
95.
Blockchain security
96.
cache security
97.
computer security
98.
cooperative security dilemma
99.
cyber security
100.
cyber security education
101.
cyber security exercises
102.
cyber security strategies
103.
cyber-security
104.
data security
105.
development of security cameras
106.
drinking water security
107.
economic security
108.
economic security of enterprise
109.
emotional security
110.
energy security
111.
energy security indicator
112.
graded security
113.
hardware security
114.
hardware security primitive
115.
human security
116.
information security
117.
internal security
118.
international security
119.
investment and innovation security
120.
IPv6 security
121.
IT security
122.
job security
123.
long-term security
124.
metadata model for security measures
125.
Middle Eastern security
126.
Mobile security
127.
national cyber security strategy
128.
national security
129.
NATO. Science for Peace and Security Program
130.
network security
131.
network security monitoring
132.
OSCE (Organization for Security and Co-operation in Europe)
133.
passenger’s security
134.
policy-based routing security
135.
political and security cultures
136.
post-quantum security
137.
quantitative security
138.
regional security
139.
security
140.
security and privacy
141.
security and privacy in smart grids
142.
security closure
143.
Security Coverage
144.
security dataset
145.
security dilemma
146.
Security evaluation
147.
security log analysis
148.
security management
149.
security model
150.
security monitoring
151.
security notion
152.
security objectives
153.
security of data
154.
security of supply
155.
security operation center
156.
security patterns
157.
security problem definition
158.
security proof
159.
security protocols
160.
security requirements
161.
security requirements engineering
162.
security risk assessment
163.
security risk management
164.
security strategies
165.
security systems for military objects
166.
security testing
167.
security training
168.
security verification
169.
social security planning
170.
societal security
171.
terrorism security
172.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT