Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Journal of hardware and systems security (allikas)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/147)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Chip-to-Chip authentication method based on SRAM PUF and public key cryptography
Karageorgos, Ioannis
;
Isgenc, Mehmet Meric
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Journal of hardware and systems security
2019
/
p. 382–396 : ill
https://doi.org/10.1007/s41635-019-00080-y
artikkel ajakirjas
2
artikkel ajakirjas
A versatile and flexible multiplier generator for Large integer polynomials
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Journal of hardware and systems security
2023
/
p. 55–71
https://doi.org/10.1007/s41635-023-00134-2
artikkel ajakirjas
Seotud publikatsioonid
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
145
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
software/hardware systems
6.
security systems for military objects
7.
computer hardware
8.
Computer software and hardware
9.
crypto-hardware
10.
DNN hardware accelerator
11.
Embedded hardware
12.
hardware
13.
hardware acceleration
14.
hardware accelerator
15.
hardware close programming
16.
hardware customization
17.
hardware design
18.
hardware for the IoT
19.
hardware implementation
20.
hardware in the loop
21.
hardware Obfuscation
22.
hardware problems
23.
hardware rejuvenation
24.
hardware reliability
25.
Hardware Trojan
26.
hardware trojan horse
27.
Hardware Trojan Horses
28.
hardware trojans
29.
Hardware Verification
30.
hardware/software co-design
31.
hardware-in-the loop simulation
32.
hardware-in-the-loop
33.
Hardware-in-the-Loop simulation
34.
integer-only hardware
35.
open hardware
36.
open source hardware
37.
opensource hardware
38.
open-source hardware
39.
power-hardware-in-the-loop
40.
reconfigurable hardware
41.
software/hardware partitioning
42.
special-purpose hardware
43.
trustworthy hardware
44.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
45.
ad-hoc sensor networks security
46.
Automatic Security Verification
47.
Blockchain security
48.
cache security
49.
communication system security
50.
comprehensive system of economic security
51.
computer security
52.
cooperative security dilemma
53.
cyber security
54.
cyber security education
55.
cyber security exercises
56.
cyber security monitoring
57.
cyber security strategies
58.
cyber-security
59.
data security
60.
development of security cameras
61.
drinking water security
62.
economic security
63.
economic security of enterprise
64.
emotional security
65.
energy security
66.
energy security indicator
67.
Estonian information security standard
68.
graded security
69.
human security
70.
information security
71.
information security and privacy
72.
internal security
73.
international security
74.
investment and innovation security
75.
IPv6 security
76.
IT security
77.
IT security management
78.
job security
79.
long-term security
80.
metadata model for security measures
81.
Middle Eastern security
82.
Mobile security
83.
national cyber security strategy
84.
national security
85.
NATO. Science for Peace and Security Program
86.
network security
87.
network security monitoring
88.
OSCE (Organization for Security and Co-operation in Europe)
89.
passenger’s security
90.
policy-based routing security
91.
political and security cultures
92.
post-quantum security
93.
power system security
94.
quantitative security
95.
regional security
96.
RISC-V Security Verification
97.
safety and security testing
98.
security
99.
security adaptation
100.
security alert prioritization
101.
security analysis
102.
security and justice (AFSJ)
103.
Security and political science
104.
security and privacy
105.
security and privacy in smart grids
106.
Security Assertion Mining
107.
security closure
108.
Security Coverage
109.
security dataset
110.
security dilemma
111.
Security evaluation
112.
security evaluation instruments
113.
Security limitations
114.
security log analysis
115.
security management
116.
security model
117.
security monitoring
118.
security notion
119.
security objectives
120.
security of data
121.
security of supply
122.
security operation center
123.
security operations center
124.
security patterns
125.
security policy
126.
security problem definition
127.
security proof
128.
security protocols
129.
security requirements
130.
security requirements engineering
131.
security risk assessment
132.
security risk management
133.
security risks
134.
security strategies
135.
security testing
136.
security training
137.
security verification
138.
security-by-design
139.
social security planning
140.
societal security
141.
system of economic security
142.
system security
143.
terrorism security
144.
transmission System Security
145.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT