Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security and privacy (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/136)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Attribute-based encryption for named data networking
Lenin, Aleksandr
;
Laud, Peeter
ICN '21 : Proceedings of the 8th ACM Conference on Information-Centric Networking
2021
/
p. 118–120
https://doi.org/10.1145/3460417.3483371
book article
Number of records 1, displaying
1 - 1
keyword
134
1.
information security and privacy
2.
security and privacy
3.
security and privacy in smart grids
4.
voting privacy and security
5.
data privacy
6.
differential privacy
7.
human privacy
8.
posthumous privacy
9.
post-mortem privacy
10.
privacy
11.
privacy by design
12.
privacy coins
13.
privacy concerns
14.
privacy of participants
15.
privacy policy
16.
privacy-enhancing technologies
17.
Privacy-preserving
18.
user awareness of privacy threats
19.
ad-hoc sensor networks security
20.
Automatic Security Verification
21.
Blockchain security
22.
cache security
23.
communication system security
24.
comprehensive system of economic security
25.
computer security
26.
cooperative security dilemma
27.
cyber security
28.
cyber security education
29.
cyber security exercises
30.
cyber security monitoring
31.
cyber security strategies
32.
cyber-security
33.
data and information security
34.
data security
35.
development of security cameras
36.
digital security practices
37.
drinking water security
38.
economic security
39.
economic security of enterprise
40.
emotional security
41.
energy security
42.
energy security indicator
43.
Estonian information security standard
44.
graded security
45.
hardware security
46.
hardware security primitive
47.
high level of security
48.
Homeland security
49.
human security
50.
information security
51.
initial level of security
52.
internal security
53.
international security
54.
investment and innovation security
55.
IPv6 security
56.
IT security
57.
IT security management
58.
job security
59.
long-term security
60.
maritime cyber security
61.
maritime cyber security operations centers
62.
Maritime Security Operations Center (M-SOC)
63.
medium level of security
64.
metadata model for security measures
65.
Middle Eastern security
66.
Mobile security
67.
national cyber security strategy
68.
national security
69.
NATO. Science for Peace and Security Program
70.
network security
71.
network security monitoring
72.
OSCE (Organization for Security and Co-operation in Europe)
73.
passenger’s security
74.
policy-based routing security
75.
political and security cultures
76.
post-quantum security
77.
power system security
78.
quantitative security
79.
regional security
80.
RISC-V Security Verification
81.
Safety and Security in Sea Transportation
82.
safety and security testing
83.
security
84.
security adaptation
85.
security alert prioritization
86.
security analysis
87.
security and justice (AFSJ)
88.
Security and political science
89.
Security Assertion Mining
90.
security closure
91.
Security Coverage
92.
security dataset
93.
security dilemma
94.
Security evaluation
95.
security evaluation instruments
96.
Security limitations
97.
security log analysis
98.
security management
99.
security model
100.
security monitoring
101.
security notion
102.
security objectives
103.
security of data
104.
security of supply
105.
security operation center
106.
security operations center
107.
security patterns
108.
security policy
109.
security problem definition
110.
security proof
111.
security protocols
112.
security requirements
113.
security requirements engineering
114.
security research
115.
security risk assessment
116.
security risk management
117.
security risks
118.
security science and technology
119.
security strategies
120.
security systems for military objects
121.
security testing
122.
security training
123.
security verification
124.
security-by-design
125.
social security planning
126.
societal security
127.
software security
128.
software security level
129.
software security subcharacteristics
130.
sufficient level of security
131.
system of economic security
132.
system security
133.
terrorism security
134.
transmission System Security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT