Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
hardware security primitive (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/168)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Survey on the benefits of using memristors for PUFs
Aljafar, Muayad J.
;
Acken, John M.
International Journal of Parallel, Emergent and Distributed Systems
2022
/
p. 40-67
https://doi.org/10.1080/17445760.2021.1972295
journal article
Number of records 1, displaying
1 - 1
keyword
166
1.
hardware security primitive
2.
hardware security
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
computer hardware
6.
Computer software and hardware
7.
crypto-hardware
8.
DNN hardware accelerator
9.
Embedded hardware
10.
hardware
11.
hardware acceleration
12.
hardware accelerator
13.
hardware close programming
14.
hardware customization
15.
hardware design
16.
hardware for the IoT
17.
hardware implementation
18.
hardware in the loop
19.
hardware Obfuscation
20.
hardware problems
21.
hardware rejuvenation
22.
hardware reliability
23.
Hardware Trojan
24.
hardware trojan horse
25.
Hardware Trojan Horses
26.
hardware trojans
27.
Hardware Trojans (HT)
28.
Hardware Verification
29.
hardware/software co-design
30.
hardware-in-the loop simulation
31.
hardware-in-the-loop
32.
Hardware-in-the-Loop simulation
33.
hardware-software integration in robotics
34.
integer-only hardware
35.
open hardware
36.
open source hardware
37.
opensource hardware
38.
open-source hardware
39.
power-hardware-in-the-loop
40.
reconfigurable hardware
41.
software/hardware partitioning
42.
software/hardware systems
43.
special-purpose hardware
44.
trustworthy hardware
45.
ad-hoc sensor networks security
46.
Automatic Security Verification
47.
Blockchain security
48.
cache security
49.
cloud security
50.
communication system security
51.
comprehensive system of economic security
52.
computer security
53.
cooperative security dilemma
54.
cyber security
55.
cyber security education
56.
cyber security exercises
57.
cyber security monitoring
58.
cyber security strategies
59.
cyber-physical system security
60.
cyber-security
61.
data and information security
62.
data security
63.
development of security cameras
64.
digital security practices
65.
drinking water security
66.
economic security
67.
economic security of enterprise
68.
emotional security
69.
energy security
70.
energy security indicator
71.
Estonian information security standard
72.
graded security
73.
high level of security
74.
Homeland security
75.
human security
76.
information security
77.
information security and privacy
78.
initial level of security
79.
internal security
80.
international security
81.
investment and innovation security
82.
IPv6 security
83.
IT security
84.
IT security management
85.
job security
86.
long-term security
87.
maritime cyber security
88.
maritime cyber security operations centers
89.
Maritime Security Operations Center (M-SOC)
90.
medium level of security
91.
metadata model for security measures
92.
Middle Eastern security
93.
Mobile security
94.
national cyber security strategy
95.
national security
96.
NATO. Science for Peace and Security Program
97.
network security
98.
network security monitoring
99.
OSCE (Organization for Security and Co-operation in Europe)
100.
passenger’s security
101.
policy-based routing security
102.
political and security cultures
103.
post-quantum security
104.
power system security
105.
quantitative security
106.
regional security
107.
RISC-V Security Verification
108.
Safety and Security in Sea Transportation
109.
safety and security testing
110.
security
111.
security adaptation
112.
security alert prioritization
113.
security analysis
114.
security and justice (AFSJ)
115.
Security and political science
116.
security and privacy
117.
security and privacy in smart grids
118.
Security Assertion
119.
Security Assertion Mining
120.
security closure
121.
Security Coverage
122.
security dataset
123.
security dilemma
124.
Security evaluation
125.
security evaluation instruments
126.
Security Level Evaluation
127.
Security limitations
128.
security log analysis
129.
security management
130.
security model
131.
security monitoring
132.
security notion
133.
security objectives
134.
security of data
135.
security of supply
136.
security operation center
137.
security operations center
138.
security patterns
139.
security policy
140.
security problem definition
141.
security proof
142.
security protocols
143.
security requirements
144.
security requirements engineering
145.
security research
146.
security risk assessment
147.
security risk management
148.
security risks
149.
security science and technology
150.
security strategies
151.
security systems for military objects
152.
security testing
153.
security training
154.
security verification
155.
security-by-design
156.
social security planning
157.
societal security
158.
software security
159.
software security level
160.
software security subcharacteristics
161.
sufficient level of security
162.
system of economic security
163.
system security
164.
terrorism security
165.
transmission System Security
166.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT