Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
post-quantum security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(5/249)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Keyless signature infrastructure and PKI : hash-tree signatures in pre- and post-quantum world
Buldas, Ahto
;
Laanoja, Risto
;
Truu, Ahto
International journal of services technology and management
2017
/
p. 117-130 : ill
https://doi.org/10.1504/IJSTM.2017.10002708
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
225
1.
post-quantum security
2.
polynomial multiplication; post-quantum cryptography
3.
post-quantum
4.
post-quantum cryptography
5.
post-quantum one-way functions
6.
ameliorated quantum class topper optimization (A-QCTO)
7.
external quantum efficiency
8.
parabolic quantum well
9.
parabolic quantum wells
10.
quantum algorithm
11.
quantum attack
12.
quantum chemical calculations
13.
quantum communication
14.
quantum communication chanell
15.
quantum computing
16.
quantum cryptography
17.
quantum detectors
18.
quantum dots (QDs)
19.
quantum efficiency
20.
quantum groups
21.
quantum grover
22.
quantum internet
23.
quantum logic
24.
quantum matrix spaces
25.
quantum noise
26.
Quantum state verification
27.
quantum structures
28.
quantum tunneling
29.
quantum well
30.
quantum wells
31.
quantum-enhanced secure and energy-efficient routing (QSEER) protocol
32.
quantum-inspired algorithms
33.
quantum-inspired clustering scheme (QICS)
34.
chemical post-deposition treatment
35.
coating post-treatment
36.
conflicts in post-Soviet space
37.
EU post-2020 biodiversity strategy
38.
ex post analysis
39.
GDPR post-mortem
40.
Physicochemical pre- and post-treatment
41.
post deposition annealing
42.
post normal science
43.
post translational modifications
44.
post-analysis of rules
45.
post-annealing treatment
46.
post-blockchain
47.
post-Brexit
48.
post-buckling response
49.
post-capitalism
50.
post-combustion
51.
Post-combustion capture
52.
post-communist
53.
post-communist regimes
54.
post-communist transition
55.
post-conflict
56.
post-conflict justice
57.
post-conflict reconstruction
58.
postconsumer textile waste
59.
post-consumer textile wastes
60.
post-COVID recovery
61.
Post-deposition treatment
62.
post-disaster housing reconstruction
63.
post-glacial land uplift
64.
post-granulation treatment
65.
post-growth
66.
Post-Hoc explainability
67.
post-hoc explanation
68.
post-humanism
69.
post-mining land use
70.
post-mortem
71.
post-mortem privacy
72.
post-normal science
73.
post-NPM
74.
post-plasma catalysis (PPC)
75.
post-politics
76.
post-polymerization modification
77.
post-positivism
78.
post-precipitated tertiary sludge
79.
post-processing
80.
post-regulated
81.
post-release rehabilitation
82.
post-secondary education
83.
post-Shannon communication
84.
post-socialism
85.
post-socialist
86.
post-socialist city
87.
post-socialist countries
88.
post-Soviet
89.
post-Soviet bilingualism
90.
post-Soviet countries
91.
post-soviet country
92.
post-soviet politics
93.
post-Soviet region
94.
Post–Soviet states
95.
post‐transcriptional regulation
96.
post-transitional country
97.
post-translational modification
98.
post-traumatic stress disorder
99.
post-traumatic stress disorder (PTSD)
100.
post-treatment
101.
post-truth
102.
post-ultimate response
103.
social media accounts post-mortem
104.
ad-hoc sensor networks security
105.
Automatic Security Verification
106.
Blockchain security
107.
cache security
108.
cloud security
109.
communication system security
110.
comprehensive system of economic security
111.
computer security
112.
cooperative security dilemma
113.
cyber security
114.
cyber security education
115.
cyber security exercises
116.
cyber security monitoring
117.
cyber security strategies
118.
cyber-security
119.
data and information security
120.
data security
121.
development of security cameras
122.
digital security practices
123.
drinking water security
124.
economic security
125.
economic security of enterprise
126.
emotional security
127.
energy security
128.
energy security indicator
129.
Estonian information security standard
130.
graded security
131.
hardware security
132.
hardware security primitive
133.
high level of security
134.
Homeland security
135.
human security
136.
information security
137.
information security and privacy
138.
initial level of security
139.
internal security
140.
international security
141.
investment and innovation security
142.
IPv6 security
143.
IT security
144.
IT security management
145.
job security
146.
long-term security
147.
maritime cyber security
148.
maritime cyber security operations centers
149.
Maritime Security Operations Center (M-SOC)
150.
medium level of security
151.
metadata model for security measures
152.
Middle Eastern security
153.
Mobile security
154.
national cyber security strategy
155.
national security
156.
NATO. Science for Peace and Security Program
157.
network security
158.
network security monitoring
159.
OSCE (Organization for Security and Co-operation in Europe)
160.
passenger’s security
161.
policy-based routing security
162.
political and security cultures
163.
power system security
164.
quantitative security
165.
regional security
166.
RISC-V Security Verification
167.
Safety and Security in Sea Transportation
168.
safety and security testing
169.
security
170.
security adaptation
171.
security alert prioritization
172.
security analysis
173.
security and justice (AFSJ)
174.
Security and political science
175.
security and privacy
176.
security and privacy in smart grids
177.
Security Assertion
178.
Security Assertion Mining
179.
security closure
180.
Security Coverage
181.
security dataset
182.
security dilemma
183.
Security evaluation
184.
security evaluation instruments
185.
Security Level Evaluation
186.
Security limitations
187.
security log analysis
188.
security management
189.
security model
190.
security monitoring
191.
security notion
192.
security objectives
193.
security of data
194.
security of supply
195.
security operation center
196.
security operations center
197.
security patterns
198.
security policy
199.
security problem definition
200.
security proof
201.
security protocols
202.
security requirements
203.
security requirements engineering
204.
security research
205.
security risk assessment
206.
security risk management
207.
security risks
208.
security science and technology
209.
security strategies
210.
security systems for military objects
211.
security testing
212.
security training
213.
security verification
214.
security-by-design
215.
social security planning
216.
societal security
217.
software security
218.
software security level
219.
software security subcharacteristics
220.
sufficient level of security
221.
system of economic security
222.
system security
223.
terrorism security
224.
transmission System Security
225.
voting privacy and security
author
14
1.
Post, Annaliisa
2.
Post, Eda
3.
Post, H.
4.
Post, Liisa
5.
Post, P.
6.
Post, Piia
7.
Post, R.
8.
Post, Ruuben
9.
Post, T.
10.
Post, Tarmo
11.
Post, Tiit
12.
Post, Triine
13.
Post, V.
14.
Post, Voldemar
subject term
5
1.
Eesti Post
2.
e-post
3.
post
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
CV
3
1.
Post, Tarmo
2.
Post, Tiit
3.
Post, Voldemar 1897-1970
name of the person
2
1.
Post, Tarmo
2.
Post, Voldemar, 1897-1970
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT