Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
security and privacy (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/136)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus
Attribute-based encryption for named data networking
Lenin, Aleksandr
;
Laud, Peeter
ICN '21 : Proceedings of the 8th ACM Conference on Information-Centric Networking
2021
/
p. 118–120
https://doi.org/10.1145/3460417.3483371
artikkel kogumikus
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
134
1.
information security and privacy
2.
security and privacy
3.
security and privacy in smart grids
4.
voting privacy and security
5.
data privacy
6.
differential privacy
7.
human privacy
8.
posthumous privacy
9.
post-mortem privacy
10.
privacy
11.
privacy by design
12.
privacy coins
13.
privacy concerns
14.
privacy of participants
15.
privacy policy
16.
privacy-enhancing technologies
17.
Privacy-preserving
18.
user awareness of privacy threats
19.
ad-hoc sensor networks security
20.
Automatic Security Verification
21.
Blockchain security
22.
cache security
23.
communication system security
24.
comprehensive system of economic security
25.
computer security
26.
cooperative security dilemma
27.
cyber security
28.
cyber security education
29.
cyber security exercises
30.
cyber security monitoring
31.
cyber security strategies
32.
cyber-security
33.
data and information security
34.
data security
35.
development of security cameras
36.
digital security practices
37.
drinking water security
38.
economic security
39.
economic security of enterprise
40.
emotional security
41.
energy security
42.
energy security indicator
43.
Estonian information security standard
44.
graded security
45.
hardware security
46.
hardware security primitive
47.
high level of security
48.
Homeland security
49.
human security
50.
information security
51.
initial level of security
52.
internal security
53.
international security
54.
investment and innovation security
55.
IPv6 security
56.
IT security
57.
IT security management
58.
job security
59.
long-term security
60.
maritime cyber security
61.
maritime cyber security operations centers
62.
Maritime Security Operations Center (M-SOC)
63.
medium level of security
64.
metadata model for security measures
65.
Middle Eastern security
66.
Mobile security
67.
national cyber security strategy
68.
national security
69.
NATO. Science for Peace and Security Program
70.
network security
71.
network security monitoring
72.
OSCE (Organization for Security and Co-operation in Europe)
73.
passenger’s security
74.
policy-based routing security
75.
political and security cultures
76.
post-quantum security
77.
power system security
78.
quantitative security
79.
regional security
80.
RISC-V Security Verification
81.
Safety and Security in Sea Transportation
82.
safety and security testing
83.
security
84.
security adaptation
85.
security alert prioritization
86.
security analysis
87.
security and justice (AFSJ)
88.
Security and political science
89.
Security Assertion Mining
90.
security closure
91.
Security Coverage
92.
security dataset
93.
security dilemma
94.
Security evaluation
95.
security evaluation instruments
96.
Security limitations
97.
security log analysis
98.
security management
99.
security model
100.
security monitoring
101.
security notion
102.
security objectives
103.
security of data
104.
security of supply
105.
security operation center
106.
security operations center
107.
security patterns
108.
security policy
109.
security problem definition
110.
security proof
111.
security protocols
112.
security requirements
113.
security requirements engineering
114.
security research
115.
security risk assessment
116.
security risk management
117.
security risks
118.
security science and technology
119.
security strategies
120.
security systems for military objects
121.
security testing
122.
security training
123.
security verification
124.
security-by-design
125.
social security planning
126.
societal security
127.
software security
128.
software security level
129.
software security subcharacteristics
130.
sufficient level of security
131.
system of economic security
132.
system security
133.
terrorism security
134.
transmission System Security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT