Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
voting privacy and security (võtmesõna)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
1
Vaata veel..
(2/162)
Ekspordi
ekspordi kõik päringu tulemused
(1)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel kogumikus EST
/
artikkel kogumikus ENG
Russian Federal remote E-voting scheme of 2021 - protocol description and analysis
Vakarjuk, Jelizaveta
;
Snetkov, Nikita
;
Willemson, Jan
EICC '22: Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference
2022
/
p. 29-35
https://doi.org/10.1145/3528580.3528586
Conference proceedings at Scopus
Article at Scopus
artikkel kogumikus EST
/
artikkel kogumikus ENG
Kirjeid leitud 1, kuvan
1 - 1
võtmesõna
160
1.
voting privacy and security
2.
information security and privacy
3.
security and privacy
4.
security and privacy in smart grids
5.
data privacy
6.
differential privacy
7.
human privacy
8.
posthumous privacy
9.
post-mortem privacy
10.
privacy
11.
privacy by design
12.
privacy coins
13.
privacy concerns
14.
privacy of participants
15.
privacy policy
16.
privacy-enhancing technologies
17.
Privacy-preserving
18.
user awareness of privacy threats
19.
convenience voting
20.
early voting
21.
electronic voting
22.
electronic voting protocols
23.
email voting
24.
European i-voting
25.
e-voting
26.
framework of internet voting
27.
Internet voting
28.
Internet-based voting
29.
I-voting
30.
new voting technologies
31.
open voting
32.
postal voting
33.
remote electronic voting
34.
shareholder voting
35.
Trustworthy Voting
36.
voting
37.
voting behavior
38.
voting innovations
39.
voting power
40.
ad-hoc sensor networks security
41.
Automatic Security Verification
42.
Blockchain security
43.
cache security
44.
cloud security
45.
communication system security
46.
comprehensive system of economic security
47.
computer security
48.
cooperative security dilemma
49.
cyber security
50.
cyber security education
51.
cyber security exercises
52.
cyber security monitoring
53.
cyber security monitoring in maritime
54.
cyber security strategies
55.
cyber-physical system security
56.
cyber-security
57.
data and information security
58.
data security
59.
development of security cameras
60.
digital security practices
61.
drinking water security
62.
economic security
63.
economic security of enterprise
64.
emotional security
65.
energy security
66.
energy security indicator
67.
Estonian information security standard
68.
graded security
69.
hardware security
70.
hardware security primitive
71.
high level of security
72.
Homeland security
73.
human security
74.
information security
75.
initial level of security
76.
internal security
77.
international security
78.
investment and innovation security
79.
IPv6 security
80.
IT security
81.
IT security management
82.
job security
83.
long-term security
84.
maritime cyber security
85.
maritime cyber security operations centers
86.
Maritime Security Operations Center (M-SOC)
87.
medium level of security
88.
metadata model for security measures
89.
Middle Eastern security
90.
Mobile security
91.
national cyber security strategy
92.
national security
93.
NATO. Science for Peace and Security Program
94.
network security
95.
network security monitoring
96.
OSCE (Organization for Security and Co-operation in Europe)
97.
passenger’s security
98.
policy-based routing security
99.
political and security cultures
100.
post-quantum security
101.
power system security
102.
quantitative security
103.
regional security
104.
RISC-V Security Verification
105.
Safety and Security in Sea Transportation
106.
safety and security testing
107.
security
108.
security adaptation
109.
security alert prioritization
110.
security analysis
111.
security and justice (AFSJ)
112.
Security and political science
113.
Security Assertion
114.
Security Assertion Mining
115.
security closure
116.
Security Coverage
117.
security dataset
118.
security dilemma
119.
Security evaluation
120.
security evaluation instruments
121.
Security Level Evaluation
122.
Security limitations
123.
security log analysis
124.
security management
125.
security model
126.
security monitoring
127.
security notion
128.
security objectives
129.
security of data
130.
security of supply
131.
security operation center
132.
security operations center
133.
security patterns
134.
security policy
135.
security problem definition
136.
security proof
137.
security protocols
138.
security requirements
139.
security requirements engineering
140.
security research
141.
security risk assessment
142.
security risk management
143.
security risks
144.
security science and technology
145.
security strategies
146.
security systems for military objects
147.
security testing
148.
security training
149.
security verification
150.
security-by-design
151.
social security planning
152.
societal security
153.
software security
154.
software security level
155.
software security subcharacteristics
156.
sufficient level of security
157.
system of economic security
158.
system security
159.
terrorism security
160.
transmission System Security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT