Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Journal of hardware and systems security (allikas)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/153)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Chip-to-Chip authentication method based on SRAM PUF and public key cryptography
Karageorgos, Ioannis
;
Isgenc, Mehmet Meric
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Journal of hardware and systems security
2019
/
p. 382–396 : ill
https://doi.org/10.1007/s41635-019-00080-y
artikkel ajakirjas
2
artikkel ajakirjas
A versatile and flexible multiplier generator for Large integer polynomials
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Journal of hardware and systems security
2023
/
p. 55–71
https://doi.org/10.1007/s41635-023-00134-2
artikkel ajakirjas
Seotud publikatsioonid
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
151
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
software/hardware systems
6.
security systems for military objects
7.
computer hardware
8.
Computer software and hardware
9.
crypto-hardware
10.
DNN hardware accelerator
11.
Embedded hardware
12.
hardware
13.
hardware acceleration
14.
hardware accelerator
15.
hardware close programming
16.
hardware customization
17.
hardware design
18.
hardware for the IoT
19.
hardware implementation
20.
hardware in the loop
21.
hardware Obfuscation
22.
hardware problems
23.
hardware rejuvenation
24.
hardware reliability
25.
Hardware Trojan
26.
hardware trojan horse
27.
Hardware Trojan Horses
28.
hardware trojans
29.
Hardware Trojans (HT)
30.
Hardware Verification
31.
hardware/software co-design
32.
hardware-in-the loop simulation
33.
hardware-in-the-loop
34.
Hardware-in-the-Loop simulation
35.
integer-only hardware
36.
open hardware
37.
open source hardware
38.
opensource hardware
39.
open-source hardware
40.
power-hardware-in-the-loop
41.
reconfigurable hardware
42.
software/hardware partitioning
43.
special-purpose hardware
44.
trustworthy hardware
45.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
46.
ad-hoc sensor networks security
47.
Automatic Security Verification
48.
Blockchain security
49.
cache security
50.
communication system security
51.
comprehensive system of economic security
52.
computer security
53.
cooperative security dilemma
54.
cyber security
55.
cyber security education
56.
cyber security exercises
57.
cyber security monitoring
58.
cyber security strategies
59.
cyber-security
60.
data and information security
61.
data security
62.
development of security cameras
63.
digital security practices
64.
drinking water security
65.
economic security
66.
economic security of enterprise
67.
emotional security
68.
energy security
69.
energy security indicator
70.
Estonian information security standard
71.
graded security
72.
Homeland security
73.
human security
74.
information security
75.
information security and privacy
76.
internal security
77.
international security
78.
investment and innovation security
79.
IPv6 security
80.
IT security
81.
IT security management
82.
job security
83.
long-term security
84.
metadata model for security measures
85.
Middle Eastern security
86.
Mobile security
87.
national cyber security strategy
88.
national security
89.
NATO. Science for Peace and Security Program
90.
network security
91.
network security monitoring
92.
OSCE (Organization for Security and Co-operation in Europe)
93.
passenger’s security
94.
policy-based routing security
95.
political and security cultures
96.
post-quantum security
97.
power system security
98.
quantitative security
99.
regional security
100.
RISC-V Security Verification
101.
Safety and Security in Sea Transportation
102.
safety and security testing
103.
security
104.
security adaptation
105.
security alert prioritization
106.
security analysis
107.
security and justice (AFSJ)
108.
Security and political science
109.
security and privacy
110.
security and privacy in smart grids
111.
Security Assertion Mining
112.
security closure
113.
Security Coverage
114.
security dataset
115.
security dilemma
116.
Security evaluation
117.
security evaluation instruments
118.
Security limitations
119.
security log analysis
120.
security management
121.
security model
122.
security monitoring
123.
security notion
124.
security objectives
125.
security of data
126.
security of supply
127.
security operation center
128.
security operations center
129.
security patterns
130.
security policy
131.
security problem definition
132.
security proof
133.
security protocols
134.
security requirements
135.
security requirements engineering
136.
security risk assessment
137.
security risk management
138.
security risks
139.
security science and technology
140.
security strategies
141.
security testing
142.
security training
143.
security verification
144.
security-by-design
145.
social security planning
146.
societal security
147.
system of economic security
148.
system security
149.
terrorism security
150.
transmission System Security
151.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT