Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Journal of hardware and systems security (allikas)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/151)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Chip-to-Chip authentication method based on SRAM PUF and public key cryptography
Karageorgos, Ioannis
;
Isgenc, Mehmet Meric
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Journal of hardware and systems security
2019
/
p. 382–396 : ill
https://doi.org/10.1007/s41635-019-00080-y
artikkel ajakirjas
2
artikkel ajakirjas
A versatile and flexible multiplier generator for Large integer polynomials
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Journal of hardware and systems security
2023
/
p. 55–71
https://doi.org/10.1007/s41635-023-00134-2
artikkel ajakirjas
Seotud publikatsioonid
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
149
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
software/hardware systems
6.
security systems for military objects
7.
computer hardware
8.
Computer software and hardware
9.
crypto-hardware
10.
DNN hardware accelerator
11.
Embedded hardware
12.
hardware
13.
hardware acceleration
14.
hardware accelerator
15.
hardware close programming
16.
hardware customization
17.
hardware design
18.
hardware for the IoT
19.
hardware implementation
20.
hardware in the loop
21.
hardware Obfuscation
22.
hardware problems
23.
hardware rejuvenation
24.
hardware reliability
25.
Hardware Trojan
26.
hardware trojan horse
27.
Hardware Trojan Horses
28.
hardware trojans
29.
Hardware Verification
30.
hardware/software co-design
31.
hardware-in-the loop simulation
32.
hardware-in-the-loop
33.
Hardware-in-the-Loop simulation
34.
integer-only hardware
35.
open hardware
36.
open source hardware
37.
opensource hardware
38.
open-source hardware
39.
power-hardware-in-the-loop
40.
reconfigurable hardware
41.
software/hardware partitioning
42.
special-purpose hardware
43.
trustworthy hardware
44.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
45.
ad-hoc sensor networks security
46.
Automatic Security Verification
47.
Blockchain security
48.
cache security
49.
communication system security
50.
comprehensive system of economic security
51.
computer security
52.
cooperative security dilemma
53.
cyber security
54.
cyber security education
55.
cyber security exercises
56.
cyber security monitoring
57.
cyber security strategies
58.
cyber-security
59.
data and information security
60.
data security
61.
development of security cameras
62.
digital security practices
63.
drinking water security
64.
economic security
65.
economic security of enterprise
66.
emotional security
67.
energy security
68.
energy security indicator
69.
Estonian information security standard
70.
graded security
71.
human security
72.
information security
73.
information security and privacy
74.
internal security
75.
international security
76.
investment and innovation security
77.
IPv6 security
78.
IT security
79.
IT security management
80.
job security
81.
long-term security
82.
metadata model for security measures
83.
Middle Eastern security
84.
Mobile security
85.
national cyber security strategy
86.
national security
87.
NATO. Science for Peace and Security Program
88.
network security
89.
network security monitoring
90.
OSCE (Organization for Security and Co-operation in Europe)
91.
passenger’s security
92.
policy-based routing security
93.
political and security cultures
94.
post-quantum security
95.
power system security
96.
quantitative security
97.
regional security
98.
RISC-V Security Verification
99.
Safety and Security in Sea Transportation
100.
safety and security testing
101.
security
102.
security adaptation
103.
security alert prioritization
104.
security analysis
105.
security and justice (AFSJ)
106.
Security and political science
107.
security and privacy
108.
security and privacy in smart grids
109.
Security Assertion Mining
110.
security closure
111.
Security Coverage
112.
security dataset
113.
security dilemma
114.
Security evaluation
115.
security evaluation instruments
116.
Security limitations
117.
security log analysis
118.
security management
119.
security model
120.
security monitoring
121.
security notion
122.
security objectives
123.
security of data
124.
security of supply
125.
security operation center
126.
security operations center
127.
security patterns
128.
security policy
129.
security problem definition
130.
security proof
131.
security protocols
132.
security requirements
133.
security requirements engineering
134.
security risk assessment
135.
security risk management
136.
security risks
137.
security science and technology
138.
security strategies
139.
security testing
140.
security training
141.
security verification
142.
security-by-design
143.
social security planning
144.
societal security
145.
system of economic security
146.
system security
147.
terrorism security
148.
transmission System Security
149.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT