Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
long-term security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(3/169)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Long-term secure time-stamping using preimage-aware hash functions : (short version)
Buldas, Ahto
;
Geihs, Matthias
;
Buchmann, Johannes
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23–25, 2017 : proceedings
2017
/
p. 251-260 : ill
http://doi.org/10.1007/978-3-319-68637-0_15
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
163
1.
long-term security
2.
alnus long-term population dynamics
3.
fleet long-term scheduling
4.
long short term memory
5.
long short -term memory (LSTM)
6.
long short-term memory
7.
long short-term memory (LSTM)
8.
Long Short-Term Memory Networks (LSTMs)
9.
Long Term Evolution
10.
long term evolution (LTE)
11.
long term monitoring
12.
long term nanotoxicity
13.
long term renovation strategy
14.
long term stability of rooms
15.
long term viability
16.
long-short term learning
17.
long-short term memory
18.
long-short-term memory (LSTM)
19.
long-term
20.
long-term circulation
21.
long-term cultivation
22.
long-term datasets
23.
long-term evolution (LTE) sidelink
24.
long-term hydrodynamic modelling
25.
long-term monitoring
26.
long-term performance analysis
27.
long-term residents
28.
long-term stability
29.
short and long term prediction
30.
negative term
31.
short-term forecast
32.
Short‐Term Scientific Mission (STSM)
33.
short-term energy management
34.
short-term load forecast
35.
short-term load forecasting
36.
short-term loans
37.
short-term thermal storage
38.
term operations
39.
term search
40.
term-frequency analysis
41.
three term control systems
42.
two-term control
43.
long chain fatty acid (LCFA) inhibition
44.
Long coaxial heat exchanger
45.
long period moisture movements
46.
long run dependence
47.
long shelf-life
48.
long time behaviour
49.
long transmission line
50.
long wave
51.
long wave run-up
52.
long wave runup on a beach
53.
long wave run-up on a beach
54.
long wave run-up on the coast
55.
long waves
56.
long-read RNA sequencing
57.
long-span structure
58.
runup of long waves on a coast
59.
run-up of long waves on a coast
60.
traveling long waves
61.
ad-hoc sensor networks security
62.
Automatic Security Verification
63.
Blockchain security
64.
cache security
65.
communication system security
66.
comprehensive system of economic security
67.
computer security
68.
cooperative security dilemma
69.
cyber security
70.
cyber security education
71.
cyber security exercises
72.
cyber security monitoring
73.
cyber security strategies
74.
cyber-security
75.
data security
76.
development of security cameras
77.
drinking water security
78.
economic security
79.
economic security of enterprise
80.
emotional security
81.
energy security
82.
energy security indicator
83.
Estonian information security standard
84.
graded security
85.
hardware security
86.
hardware security primitive
87.
human security
88.
information security
89.
information security and privacy
90.
internal security
91.
international security
92.
investment and innovation security
93.
IPv6 security
94.
IT security
95.
IT security management
96.
job security
97.
metadata model for security measures
98.
Middle Eastern security
99.
Mobile security
100.
national cyber security strategy
101.
national security
102.
NATO. Science for Peace and Security Program
103.
network security
104.
network security monitoring
105.
OSCE (Organization for Security and Co-operation in Europe)
106.
passenger’s security
107.
policy-based routing security
108.
political and security cultures
109.
post-quantum security
110.
power system security
111.
quantitative security
112.
regional security
113.
RISC-V Security Verification
114.
safety and security testing
115.
security
116.
security adaptation
117.
security alert prioritization
118.
security analysis
119.
security and justice (AFSJ)
120.
Security and political science
121.
security and privacy
122.
security and privacy in smart grids
123.
Security Assertion Mining
124.
security closure
125.
Security Coverage
126.
security dataset
127.
security dilemma
128.
Security evaluation
129.
security evaluation instruments
130.
Security limitations
131.
security log analysis
132.
security management
133.
security model
134.
security monitoring
135.
security notion
136.
security objectives
137.
security of data
138.
security of supply
139.
security operation center
140.
security operations center
141.
security patterns
142.
security policy
143.
security problem definition
144.
security proof
145.
security protocols
146.
security requirements
147.
security requirements engineering
148.
security risk assessment
149.
security risk management
150.
security risks
151.
security strategies
152.
security systems for military objects
153.
security testing
154.
security training
155.
security verification
156.
security-by-design
157.
social security planning
158.
societal security
159.
system of economic security
160.
system security
161.
terrorism security
162.
transmission System Security
163.
voting privacy and security
autor
4
1.
Leung, Kin Long
2.
Long, John A.
3.
Ni, Long
4.
Xu, Long
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT