Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Journal of hardware and systems security (source)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/120)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Chip-to-Chip authentication method based on SRAM PUF and public key cryptography
Karageorgos, Ioannis
;
Isgenc, Mehmet Meric
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Journal of hardware and systems security
2019
/
p. 382–396 : ill
https://doi.org/10.1007/s41635-019-00080-y
journal article
2
journal article
A versatile and flexible multiplier generator for Large integer polynomials
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Journal of hardware and systems security
2023
/
p. 55–71
https://doi.org/10.1007/s41635-023-00134-2
journal article
Seotud publikatsioonid
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Number of records 2, displaying
1 - 2
keyword
118
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
software/hardware systems
6.
security systems for military objects
7.
computer hardware
8.
crypto-hardware
9.
Embedded hardware
10.
hardware
11.
hardware accelerator
12.
hardware close programming
13.
hardware customization
14.
hardware design
15.
hardware for the IoT
16.
hardware implementation
17.
hardware in the loop
18.
hardware Obfuscation
19.
hardware rejuvenation
20.
hardware trojan horse
21.
Hardware Trojan Horses
22.
hardware trojans
23.
Hardware Verification
24.
hardware/software co-design
25.
hardware-in-the loop simulation
26.
Hardware-in-the-Loop simulation
27.
open hardware
28.
open source hardware
29.
opensource hardware
30.
open-source hardware
31.
power-hardware-in-the-loop
32.
reconfigurable hardware
33.
software/hardware partitioning
34.
special-purpose hardware
35.
trustworthy hardware
36.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
37.
ad-hoc sensor networks security
38.
Blockchain security
39.
cache security
40.
communication system security
41.
comprehensive system of economic security
42.
computer security
43.
cooperative security dilemma
44.
cyber security
45.
cyber security education
46.
cyber security exercises
47.
cyber security strategies
48.
cyber-security
49.
data security
50.
development of security cameras
51.
drinking water security
52.
economic security
53.
economic security of enterprise
54.
emotional security
55.
energy security
56.
energy security indicator
57.
graded security
58.
human security
59.
information security
60.
internal security
61.
international security
62.
investment and innovation security
63.
IPv6 security
64.
IT security
65.
job security
66.
long-term security
67.
metadata model for security measures
68.
Middle Eastern security
69.
Mobile security
70.
national cyber security strategy
71.
national security
72.
NATO. Science for Peace and Security Program
73.
network security
74.
network security monitoring
75.
OSCE (Organization for Security and Co-operation in Europe)
76.
passenger’s security
77.
policy-based routing security
78.
political and security cultures
79.
post-quantum security
80.
power system security
81.
quantitative security
82.
regional security
83.
security
84.
security and privacy
85.
security and privacy in smart grids
86.
security closure
87.
Security Coverage
88.
security dataset
89.
security dilemma
90.
Security evaluation
91.
security log analysis
92.
security management
93.
security model
94.
security monitoring
95.
security notion
96.
security objectives
97.
security of data
98.
security of supply
99.
security operation center
100.
security patterns
101.
security problem definition
102.
security proof
103.
security protocols
104.
security requirements
105.
security requirements engineering
106.
security risk assessment
107.
security risk management
108.
security strategies
109.
security testing
110.
security training
111.
security verification
112.
social security planning
113.
societal security
114.
system of economic security
115.
system security
116.
terrorism security
117.
transmission System Security
118.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT