Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Journal of hardware and systems security (allikas)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/167)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Chip-to-Chip authentication method based on SRAM PUF and public key cryptography
Karageorgos, Ioannis
;
Isgenc, Mehmet Meric
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Journal of hardware and systems security
2019
/
p. 382–396 : ill
https://doi.org/10.1007/s41635-019-00080-y
artikkel ajakirjas
2
artikkel ajakirjas
A versatile and flexible multiplier generator for Large integer polynomials
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Journal of hardware and systems security
2023
/
p. 55–71
https://doi.org/10.1007/s41635-023-00134-2
artikkel ajakirjas
Seotud publikatsioonid
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
165
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
software/hardware systems
6.
security systems for military objects
7.
computer hardware
8.
Computer software and hardware
9.
crypto-hardware
10.
DNN hardware accelerator
11.
Embedded hardware
12.
hardware
13.
hardware acceleration
14.
hardware accelerator
15.
hardware close programming
16.
hardware customization
17.
hardware design
18.
hardware for the IoT
19.
hardware implementation
20.
hardware in the loop
21.
hardware Obfuscation
22.
hardware problems
23.
hardware rejuvenation
24.
hardware reliability
25.
Hardware Trojan
26.
hardware trojan horse
27.
Hardware Trojan Horses
28.
hardware trojans
29.
Hardware Trojans (HT)
30.
Hardware Verification
31.
hardware/software co-design
32.
hardware-in-the loop simulation
33.
hardware-in-the-loop
34.
Hardware-in-the-Loop simulation
35.
integer-only hardware
36.
open hardware
37.
open source hardware
38.
opensource hardware
39.
open-source hardware
40.
power-hardware-in-the-loop
41.
reconfigurable hardware
42.
software/hardware partitioning
43.
special-purpose hardware
44.
trustworthy hardware
45.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
46.
ad-hoc sensor networks security
47.
Automatic Security Verification
48.
Blockchain security
49.
cache security
50.
cloud security
51.
communication system security
52.
comprehensive system of economic security
53.
computer security
54.
cooperative security dilemma
55.
cyber security
56.
cyber security education
57.
cyber security exercises
58.
cyber security monitoring
59.
cyber security strategies
60.
cyber-security
61.
data and information security
62.
data security
63.
development of security cameras
64.
digital security practices
65.
drinking water security
66.
economic security
67.
economic security of enterprise
68.
emotional security
69.
energy security
70.
energy security indicator
71.
Estonian information security standard
72.
graded security
73.
high level of security
74.
Homeland security
75.
human security
76.
information security
77.
information security and privacy
78.
initial level of security
79.
internal security
80.
international security
81.
investment and innovation security
82.
IPv6 security
83.
IT security
84.
IT security management
85.
job security
86.
long-term security
87.
maritime cyber security
88.
maritime cyber security operations centers
89.
Maritime Security Operations Center (M-SOC)
90.
medium level of security
91.
metadata model for security measures
92.
Middle Eastern security
93.
Mobile security
94.
national cyber security strategy
95.
national security
96.
NATO. Science for Peace and Security Program
97.
network security
98.
network security monitoring
99.
OSCE (Organization for Security and Co-operation in Europe)
100.
passenger’s security
101.
policy-based routing security
102.
political and security cultures
103.
post-quantum security
104.
power system security
105.
quantitative security
106.
regional security
107.
RISC-V Security Verification
108.
Safety and Security in Sea Transportation
109.
safety and security testing
110.
security
111.
security adaptation
112.
security alert prioritization
113.
security analysis
114.
security and justice (AFSJ)
115.
Security and political science
116.
security and privacy
117.
security and privacy in smart grids
118.
Security Assertion
119.
Security Assertion Mining
120.
security closure
121.
Security Coverage
122.
security dataset
123.
security dilemma
124.
Security evaluation
125.
security evaluation instruments
126.
Security Level Evaluation
127.
Security limitations
128.
security log analysis
129.
security management
130.
security model
131.
security monitoring
132.
security notion
133.
security objectives
134.
security of data
135.
security of supply
136.
security operation center
137.
security operations center
138.
security patterns
139.
security policy
140.
security problem definition
141.
security proof
142.
security protocols
143.
security requirements
144.
security requirements engineering
145.
security research
146.
security risk assessment
147.
security risk management
148.
security risks
149.
security science and technology
150.
security strategies
151.
security testing
152.
security training
153.
security verification
154.
security-by-design
155.
social security planning
156.
societal security
157.
software security
158.
software security level
159.
software security subcharacteristics
160.
sufficient level of security
161.
system of economic security
162.
system security
163.
terrorism security
164.
transmission System Security
165.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT