Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security and privacy (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/139)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Attribute-based encryption for named data networking
Lenin, Aleksandr
;
Laud, Peeter
ICN '21 : Proceedings of the 8th ACM Conference on Information-Centric Networking
2021
/
p. 118–120
https://doi.org/10.1145/3460417.3483371
book article
Number of records 1, displaying
1 - 1
keyword
137
1.
information security and privacy
2.
security and privacy
3.
security and privacy in smart grids
4.
voting privacy and security
5.
data privacy
6.
differential privacy
7.
human privacy
8.
posthumous privacy
9.
post-mortem privacy
10.
privacy
11.
privacy by design
12.
privacy coins
13.
privacy concerns
14.
privacy of participants
15.
privacy policy
16.
privacy-enhancing technologies
17.
Privacy-preserving
18.
user awareness of privacy threats
19.
ad-hoc sensor networks security
20.
Automatic Security Verification
21.
Blockchain security
22.
cache security
23.
cloud security
24.
communication system security
25.
comprehensive system of economic security
26.
computer security
27.
cooperative security dilemma
28.
cyber security
29.
cyber security education
30.
cyber security exercises
31.
cyber security monitoring
32.
cyber security strategies
33.
cyber-security
34.
data and information security
35.
data security
36.
development of security cameras
37.
digital security practices
38.
drinking water security
39.
economic security
40.
economic security of enterprise
41.
emotional security
42.
energy security
43.
energy security indicator
44.
Estonian information security standard
45.
graded security
46.
hardware security
47.
hardware security primitive
48.
high level of security
49.
Homeland security
50.
human security
51.
information security
52.
initial level of security
53.
internal security
54.
international security
55.
investment and innovation security
56.
IPv6 security
57.
IT security
58.
IT security management
59.
job security
60.
long-term security
61.
maritime cyber security
62.
maritime cyber security operations centers
63.
Maritime Security Operations Center (M-SOC)
64.
medium level of security
65.
metadata model for security measures
66.
Middle Eastern security
67.
Mobile security
68.
national cyber security strategy
69.
national security
70.
NATO. Science for Peace and Security Program
71.
network security
72.
network security monitoring
73.
OSCE (Organization for Security and Co-operation in Europe)
74.
passenger’s security
75.
policy-based routing security
76.
political and security cultures
77.
post-quantum security
78.
power system security
79.
quantitative security
80.
regional security
81.
RISC-V Security Verification
82.
Safety and Security in Sea Transportation
83.
safety and security testing
84.
security
85.
security adaptation
86.
security alert prioritization
87.
security analysis
88.
security and justice (AFSJ)
89.
Security and political science
90.
Security Assertion
91.
Security Assertion Mining
92.
security closure
93.
Security Coverage
94.
security dataset
95.
security dilemma
96.
Security evaluation
97.
security evaluation instruments
98.
Security Level Evaluation
99.
Security limitations
100.
security log analysis
101.
security management
102.
security model
103.
security monitoring
104.
security notion
105.
security objectives
106.
security of data
107.
security of supply
108.
security operation center
109.
security operations center
110.
security patterns
111.
security policy
112.
security problem definition
113.
security proof
114.
security protocols
115.
security requirements
116.
security requirements engineering
117.
security research
118.
security risk assessment
119.
security risk management
120.
security risks
121.
security science and technology
122.
security strategies
123.
security systems for military objects
124.
security testing
125.
security training
126.
security verification
127.
security-by-design
128.
social security planning
129.
societal security
130.
software security
131.
software security level
132.
software security subcharacteristics
133.
sufficient level of security
134.
system of economic security
135.
system security
136.
terrorism security
137.
transmission System Security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT