Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Security and cryptology (seeria-sari)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
5
Vaata veel..
(2/118)
Ekspordi
ekspordi kõik päringu tulemused
(5)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
raamat
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
https://doi.org/10.1007/978-3-030-60347-2
raamat
2
artikkel kogumikus
E-Voting system evaluation based on the council of Europe Recommendations : nVotes
Marcos del Blanco, David Yeregui
;
Duenas Cid, David
;
Aláiz Moretón, Hector
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
/
p. 147-166 : ill
https://doi.org/10.1007/978-3-030-60347-2_10
artikkel kogumikus
3
artikkel kogumikus EST
/
artikkel kogumikus ENG
Long-term secure commitments via extractable-binding commitments
Buldas, Ahto
;
Geihs, Matthias
;
Buchmann, Johannes
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017 : Proceedings, Part I
2017
/
p. 65-81
https://doi.org/10.1007/978-3-319-60055-0_4
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
4
artikkel kogumikus EST
/
artikkel kogumikus ENG
Simple infeasibility certificates for attack trees
Buldas, Ahto
;
Lenin, Aleksandr
;
Villemson, Jan
;
Charnamord, Anton
Advances in Information and Computer Security : 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017 : proceedings
2017
/
p. 39-55 : ill
https://doi.org/10.1007/978-3-319-64200-0_3
Conference proceedings at Scopus
Article at Scopus
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
5
artikkel kogumikus EST
/
artikkel kogumikus ENG
Tripped at the finishing line : the Åland Islands internet voting project
Duenas Cid, David
;
Krivonosova, Iuliia
;
Serrano-Iova, Radu-Antonio
;
Freire, Marlon
;
Krimmer, Robert Johannes
Electronic Voting : 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020 : proceedings
2020
/
p. 36-49 : ill
https://doi.org/10.1007/978-3-030-60347-2_3
Conference Proceedings at Scopus
Article at Scopus
Conference Proceedings at WOS
Article at WOS
artikkel kogumikus EST
/
artikkel kogumikus ENG
Seotud publikatsioonid
1
Knowledge transfer for public administrations : the case of elections and cybersecurity = Haldusasutuste teadmussiire : valimiste ja küberturvalisuse juhtum
Kirjeid leitud 5, kuvan
1 - 5
võtmesõna
116
1.
ad-hoc sensor networks security
2.
Automatic Security Verification
3.
Blockchain security
4.
cache security
5.
communication system security
6.
comprehensive system of economic security
7.
computer security
8.
cooperative security dilemma
9.
cyber security
10.
cyber security education
11.
cyber security exercises
12.
cyber security monitoring
13.
cyber security strategies
14.
cyber-security
15.
data and information security
16.
data security
17.
development of security cameras
18.
digital security practices
19.
drinking water security
20.
economic security
21.
economic security of enterprise
22.
emotional security
23.
energy security
24.
energy security indicator
25.
Estonian information security standard
26.
graded security
27.
hardware security
28.
hardware security primitive
29.
high level of security
30.
Homeland security
31.
human security
32.
information security
33.
information security and privacy
34.
initial level of security
35.
internal security
36.
international security
37.
investment and innovation security
38.
IPv6 security
39.
IT security
40.
IT security management
41.
job security
42.
long-term security
43.
medium level of security
44.
metadata model for security measures
45.
Middle Eastern security
46.
Mobile security
47.
national cyber security strategy
48.
national security
49.
NATO. Science for Peace and Security Program
50.
network security
51.
network security monitoring
52.
OSCE (Organization for Security and Co-operation in Europe)
53.
passenger’s security
54.
policy-based routing security
55.
political and security cultures
56.
post-quantum security
57.
power system security
58.
quantitative security
59.
regional security
60.
RISC-V Security Verification
61.
Safety and Security in Sea Transportation
62.
safety and security testing
63.
security
64.
security adaptation
65.
security alert prioritization
66.
security analysis
67.
security and justice (AFSJ)
68.
Security and political science
69.
security and privacy
70.
security and privacy in smart grids
71.
Security Assertion Mining
72.
security closure
73.
Security Coverage
74.
security dataset
75.
security dilemma
76.
Security evaluation
77.
security evaluation instruments
78.
Security limitations
79.
security log analysis
80.
security management
81.
security model
82.
security monitoring
83.
security notion
84.
security objectives
85.
security of data
86.
security of supply
87.
security operation center
88.
security operations center
89.
security patterns
90.
security policy
91.
security problem definition
92.
security proof
93.
security protocols
94.
security requirements
95.
security requirements engineering
96.
security risk assessment
97.
security risk management
98.
security risks
99.
security science and technology
100.
security strategies
101.
security systems for military objects
102.
security testing
103.
security training
104.
security verification
105.
security-by-design
106.
social security planning
107.
societal security
108.
software security
109.
software security level
110.
software security subcharacteristics
111.
sufficient level of security
112.
system of economic security
113.
system security
114.
terrorism security
115.
transmission System Security
116.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT