Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
long-term security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(3/139)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Long-term secure time-stamping using preimage-aware hash functions : (short version)
Buldas, Ahto
;
Geihs, Matthias
;
Buchmann, Johannes
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23–25, 2017 : proceedings
2017
/
p. 251-260 : ill
http://doi.org/10.1007/978-3-319-68637-0_15
book article
Number of records 1, displaying
1 - 1
keyword
133
1.
long-term security
2.
alnus long-term population dynamics
3.
fleet long-term scheduling
4.
long short term memory
5.
long short -term memory (LSTM)
6.
long short-term memory (LSTM)
7.
long term monitoring
8.
long term nanotoxicity
9.
long term renovation strategy
10.
long term stability of rooms
11.
long term viability
12.
long-short term memory
13.
long-short-term memory (LSTM)
14.
long-term
15.
long-term circulation
16.
long-term cultivation
17.
long-term datasets
18.
long-term evolution (LTE) sidelink
19.
long-term hydrodynamic modelling
20.
long-term monitoring
21.
long-term residents
22.
short and long term prediction
23.
negative term
24.
short-term forecast
25.
Short‐Term Scientific Mission (STSM)
26.
short-term load forecast
27.
short-term load forecasting
28.
short-term loans
29.
term operations
30.
term-frequency analysis
31.
two-term control
32.
long chain fatty acid (LCFA) inhibition
33.
Long coaxial heat exchanger
34.
long period moisture movements
35.
long run dependence
36.
long shelf-life
37.
long time behaviour
38.
long transmission line
39.
long wave
40.
long wave run-up
41.
long wave runup on a beach
42.
long wave run-up on a beach
43.
long wave run-up on the coast
44.
long waves
45.
long-read RNA sequencing
46.
long-span structure
47.
runup of long waves on a coast
48.
run-up of long waves on a coast
49.
traveling long waves
50.
ad-hoc sensor networks security
51.
Blockchain security
52.
cache security
53.
communication system security
54.
comprehensive system of economic security
55.
computer security
56.
cooperative security dilemma
57.
cyber security
58.
cyber security education
59.
cyber security exercises
60.
cyber security strategies
61.
cyber-security
62.
data security
63.
development of security cameras
64.
drinking water security
65.
economic security
66.
economic security of enterprise
67.
emotional security
68.
energy security
69.
energy security indicator
70.
graded security
71.
hardware security
72.
hardware security primitive
73.
human security
74.
information security
75.
internal security
76.
international security
77.
investment and innovation security
78.
IPv6 security
79.
IT security
80.
job security
81.
metadata model for security measures
82.
Middle Eastern security
83.
Mobile security
84.
national cyber security strategy
85.
national security
86.
NATO. Science for Peace and Security Program
87.
network security
88.
network security monitoring
89.
OSCE (Organization for Security and Co-operation in Europe)
90.
passenger’s security
91.
policy-based routing security
92.
political and security cultures
93.
post-quantum security
94.
power system security
95.
quantitative security
96.
regional security
97.
security
98.
security and privacy
99.
security and privacy in smart grids
100.
security closure
101.
Security Coverage
102.
security dataset
103.
security dilemma
104.
Security evaluation
105.
security log analysis
106.
security management
107.
security model
108.
security monitoring
109.
security notion
110.
security objectives
111.
security of data
112.
security of supply
113.
security operation center
114.
security patterns
115.
security problem definition
116.
security proof
117.
security protocols
118.
security requirements
119.
security requirements engineering
120.
security risk assessment
121.
security risk management
122.
security strategies
123.
security systems for military objects
124.
security testing
125.
security training
126.
security verification
127.
social security planning
128.
societal security
129.
system of economic security
130.
system security
131.
terrorism security
132.
transmission System Security
133.
voting privacy and security
author
4
1.
Leung, Kin Long
2.
Long, John A.
3.
Ni, Long
4.
Xu, Long
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT