Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security proof (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/133)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Long-term secure commitments via extractable-binding commitments
Buldas, Ahto
;
Geihs, Matthias
;
Buchmann, Johannes
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017 : Proceedings, Part I
2017
/
p. 65-81
https://doi.org/10.1007/978-3-319-60055-0_4
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
131
1.
security proof
2.
burden of proof
3.
constant round interactive proof
4.
mathematical proof
5.
proof assistants
6.
proof of stake
7.
proof-of-stake
8.
proof-of-stake (PoS)
9.
proof-of-work
10.
Proof-relevant interpolation
11.
standard of proof
12.
zero-knowledge proof
13.
ad-hoc sensor networks security
14.
Automatic Security Verification
15.
Blockchain security
16.
cache security
17.
communication system security
18.
comprehensive system of economic security
19.
computer security
20.
cooperative security dilemma
21.
cyber security
22.
cyber security education
23.
cyber security exercises
24.
cyber security monitoring
25.
cyber security strategies
26.
cyber-security
27.
data and information security
28.
data security
29.
development of security cameras
30.
digital security practices
31.
drinking water security
32.
economic security
33.
economic security of enterprise
34.
emotional security
35.
energy security
36.
energy security indicator
37.
Estonian information security standard
38.
graded security
39.
hardware security
40.
hardware security primitive
41.
high level of security
42.
Homeland security
43.
human security
44.
information security
45.
information security and privacy
46.
initial level of security
47.
internal security
48.
international security
49.
investment and innovation security
50.
IPv6 security
51.
IT security
52.
IT security management
53.
job security
54.
long-term security
55.
maritime cyber security
56.
maritime cyber security operations centers
57.
Maritime Security Operations Center (M-SOC)
58.
medium level of security
59.
metadata model for security measures
60.
Middle Eastern security
61.
Mobile security
62.
national cyber security strategy
63.
national security
64.
NATO. Science for Peace and Security Program
65.
network security
66.
network security monitoring
67.
OSCE (Organization for Security and Co-operation in Europe)
68.
passenger’s security
69.
policy-based routing security
70.
political and security cultures
71.
post-quantum security
72.
power system security
73.
quantitative security
74.
regional security
75.
RISC-V Security Verification
76.
Safety and Security in Sea Transportation
77.
safety and security testing
78.
security
79.
security adaptation
80.
security alert prioritization
81.
security analysis
82.
security and justice (AFSJ)
83.
Security and political science
84.
security and privacy
85.
security and privacy in smart grids
86.
Security Assertion Mining
87.
security closure
88.
Security Coverage
89.
security dataset
90.
security dilemma
91.
Security evaluation
92.
security evaluation instruments
93.
Security limitations
94.
security log analysis
95.
security management
96.
security model
97.
security monitoring
98.
security notion
99.
security objectives
100.
security of data
101.
security of supply
102.
security operation center
103.
security operations center
104.
security patterns
105.
security policy
106.
security problem definition
107.
security protocols
108.
security requirements
109.
security requirements engineering
110.
security research
111.
security risk assessment
112.
security risk management
113.
security risks
114.
security science and technology
115.
security strategies
116.
security systems for military objects
117.
security testing
118.
security training
119.
security verification
120.
security-by-design
121.
social security planning
122.
societal security
123.
software security
124.
software security level
125.
software security subcharacteristics
126.
sufficient level of security
127.
system of economic security
128.
system security
129.
terrorism security
130.
transmission System Security
131.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT