Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
post-quantum security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(5/220)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Keyless signature infrastructure and PKI : hash-tree signatures in pre- and post-quantum world
Buldas, Ahto
;
Laanoja, Risto
;
Truu, Ahto
International journal of services technology and management
2017
/
p. 117-130 : ill
https://doi.org/10.1504/IJSTM.2017.10002708
Journal metrics at Scopus
Article at Scopus
artikkel ajakirjas EST
/
artikkel ajakirjas ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
196
1.
post-quantum security
2.
polynomial multiplication; post-quantum cryptography
3.
post-quantum
4.
post-quantum cryptography
5.
post-quantum one-way functions
6.
ameliorated quantum class topper optimization (A-QCTO)
7.
external quantum efficiency
8.
parabolic quantum well
9.
parabolic quantum wells
10.
quantum attack
11.
quantum chemical calculations
12.
quantum communication
13.
quantum communication chanell
14.
quantum computing
15.
quantum cryptography
16.
quantum detectors
17.
quantum dots (QDs)
18.
quantum efficiency
19.
quantum groups
20.
quantum internet
21.
quantum logic
22.
quantum matrix spaces
23.
quantum noise
24.
Quantum state verification
25.
quantum structures
26.
quantum tunneling
27.
quantum well
28.
quantum wells
29.
chemical post-deposition treatment
30.
coating post-treatment
31.
conflicts in post-Soviet space
32.
EU post-2020 biodiversity strategy
33.
ex post analysis
34.
Physicochemical pre- and post-treatment
35.
post deposition annealing
36.
post normal science
37.
post translational modifications
38.
post-analysis of rules
39.
post-annealing treatment
40.
post-blockchain
41.
post-Brexit
42.
post-buckling response
43.
post-capitalism
44.
post-combustion
45.
Post-combustion capture
46.
post-communist
47.
post-communist regimes
48.
post-communist transition
49.
post-conflict
50.
post-conflict justice
51.
post-conflict reconstruction
52.
postconsumer textile waste
53.
post-consumer textile wastes
54.
post-COVID recovery
55.
Post-deposition treatment
56.
post-disaster housing reconstruction
57.
post-glacial land uplift
58.
post-granulation treatment
59.
post-growth
60.
Post-Hoc explainability
61.
post-hoc explanation
62.
post-humanism
63.
post-mining land use
64.
post-mortem
65.
post-normal science
66.
post-NPM
67.
post-plasma catalysis (PPC)
68.
post-politics
69.
post-positivism
70.
post-precipitated tertiary sludge
71.
post-processing
72.
post-release rehabilitation
73.
post-secondary education
74.
post-Shannon communication
75.
post-socialism
76.
post-socialist
77.
post-socialist city
78.
post-socialist countries
79.
post-Soviet
80.
post-Soviet bilingualism
81.
post-Soviet countries
82.
post-soviet country
83.
post-soviet politics
84.
post-Soviet region
85.
Post–Soviet states
86.
post‐transcriptional regulation
87.
post-transitional country
88.
post-traumatic stress disorder
89.
post-traumatic stress disorder (PTSD)
90.
post-treatment
91.
post-truth
92.
post-ultimate response
93.
ad-hoc sensor networks security
94.
Automatic Security Verification
95.
Blockchain security
96.
cache security
97.
communication system security
98.
comprehensive system of economic security
99.
computer security
100.
cooperative security dilemma
101.
cyber security
102.
cyber security education
103.
cyber security exercises
104.
cyber security monitoring
105.
cyber security strategies
106.
cyber-security
107.
data security
108.
development of security cameras
109.
digital security practices
110.
drinking water security
111.
economic security
112.
economic security of enterprise
113.
emotional security
114.
energy security
115.
energy security indicator
116.
Estonian information security standard
117.
graded security
118.
hardware security
119.
hardware security primitive
120.
human security
121.
information security
122.
information security and privacy
123.
internal security
124.
international security
125.
investment and innovation security
126.
IPv6 security
127.
IT security
128.
IT security management
129.
job security
130.
long-term security
131.
metadata model for security measures
132.
Middle Eastern security
133.
Mobile security
134.
national cyber security strategy
135.
national security
136.
NATO. Science for Peace and Security Program
137.
network security
138.
network security monitoring
139.
OSCE (Organization for Security and Co-operation in Europe)
140.
passenger’s security
141.
policy-based routing security
142.
political and security cultures
143.
power system security
144.
quantitative security
145.
regional security
146.
RISC-V Security Verification
147.
safety and security testing
148.
security
149.
security adaptation
150.
security alert prioritization
151.
security analysis
152.
security and justice (AFSJ)
153.
Security and political science
154.
security and privacy
155.
security and privacy in smart grids
156.
Security Assertion Mining
157.
security closure
158.
Security Coverage
159.
security dataset
160.
security dilemma
161.
Security evaluation
162.
security evaluation instruments
163.
Security limitations
164.
security log analysis
165.
security management
166.
security model
167.
security monitoring
168.
security notion
169.
security objectives
170.
security of data
171.
security of supply
172.
security operation center
173.
security operations center
174.
security patterns
175.
security policy
176.
security problem definition
177.
security proof
178.
security protocols
179.
security requirements
180.
security requirements engineering
181.
security risk assessment
182.
security risk management
183.
security risks
184.
security strategies
185.
security systems for military objects
186.
security testing
187.
security training
188.
security verification
189.
security-by-design
190.
social security planning
191.
societal security
192.
system of economic security
193.
system security
194.
terrorism security
195.
transmission System Security
196.
voting privacy and security
autor
14
1.
Post, Annaliisa
2.
Post, Eda
3.
Post, H.
4.
Post, Liisa
5.
Post, P.
6.
Post, Piia
7.
Post, R.
8.
Post, Ruuben
9.
Post, T.
10.
Post, Tarmo
11.
Post, Tiit
12.
Post, Triine
13.
Post, V.
14.
Post, Voldemar
märksõna
5
1.
Eesti Post
2.
e-post
3.
post
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
CV
3
1.
Post, Tarmo
2.
Post, Tiit
3.
Post, Voldemar 1897-1970
tema kohta
2
1.
Post, Tarmo
2.
Post, Voldemar, 1897-1970
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT