Toggle navigation
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Uurimisrühmad
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
Journal of hardware and systems security (allikas)
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Allika otsing
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
filter
Tühista
×
teaviku laadid
raamat
..
artikkel ajakirjas
..
artikkel ajalehes
..
artikkel kogumikus
..
dissertatsioon
..
Open Access
..
Teaduspublikatsioon
..
aasta
ilmumisaasta
Toon andmeid..
autor
Toon andmeid..
TTÜ struktuuriüksus
Toon andmeid..
märksõna
Toon andmeid..
seeria-sari
Toon andmeid..
tema kohta
Toon andmeid..
võtmesõna
Toon andmeid..
Tühista
Kirjeid leitud
2
Vaata veel..
(2/148)
Ekspordi
ekspordi kõik päringu tulemused
(2)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
artikkel ajakirjas
Chip-to-Chip authentication method based on SRAM PUF and public key cryptography
Karageorgos, Ioannis
;
Isgenc, Mehmet Meric
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Journal of hardware and systems security
2019
/
p. 382–396 : ill
https://doi.org/10.1007/s41635-019-00080-y
artikkel ajakirjas
2
artikkel ajakirjas
A versatile and flexible multiplier generator for Large integer polynomials
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Journal of hardware and systems security
2023
/
p. 55–71
https://doi.org/10.1007/s41635-023-00134-2
artikkel ajakirjas
Seotud publikatsioonid
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Kirjeid leitud 2, kuvan
1 - 2
võtmesõna
146
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
software/hardware systems
6.
security systems for military objects
7.
computer hardware
8.
Computer software and hardware
9.
crypto-hardware
10.
DNN hardware accelerator
11.
Embedded hardware
12.
hardware
13.
hardware acceleration
14.
hardware accelerator
15.
hardware close programming
16.
hardware customization
17.
hardware design
18.
hardware for the IoT
19.
hardware implementation
20.
hardware in the loop
21.
hardware Obfuscation
22.
hardware problems
23.
hardware rejuvenation
24.
hardware reliability
25.
Hardware Trojan
26.
hardware trojan horse
27.
Hardware Trojan Horses
28.
hardware trojans
29.
Hardware Verification
30.
hardware/software co-design
31.
hardware-in-the loop simulation
32.
hardware-in-the-loop
33.
Hardware-in-the-Loop simulation
34.
integer-only hardware
35.
open hardware
36.
open source hardware
37.
opensource hardware
38.
open-source hardware
39.
power-hardware-in-the-loop
40.
reconfigurable hardware
41.
software/hardware partitioning
42.
special-purpose hardware
43.
trustworthy hardware
44.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
45.
ad-hoc sensor networks security
46.
Automatic Security Verification
47.
Blockchain security
48.
cache security
49.
communication system security
50.
comprehensive system of economic security
51.
computer security
52.
cooperative security dilemma
53.
cyber security
54.
cyber security education
55.
cyber security exercises
56.
cyber security monitoring
57.
cyber security strategies
58.
cyber-security
59.
data security
60.
development of security cameras
61.
digital security practices
62.
drinking water security
63.
economic security
64.
economic security of enterprise
65.
emotional security
66.
energy security
67.
energy security indicator
68.
Estonian information security standard
69.
graded security
70.
human security
71.
information security
72.
information security and privacy
73.
internal security
74.
international security
75.
investment and innovation security
76.
IPv6 security
77.
IT security
78.
IT security management
79.
job security
80.
long-term security
81.
metadata model for security measures
82.
Middle Eastern security
83.
Mobile security
84.
national cyber security strategy
85.
national security
86.
NATO. Science for Peace and Security Program
87.
network security
88.
network security monitoring
89.
OSCE (Organization for Security and Co-operation in Europe)
90.
passenger’s security
91.
policy-based routing security
92.
political and security cultures
93.
post-quantum security
94.
power system security
95.
quantitative security
96.
regional security
97.
RISC-V Security Verification
98.
safety and security testing
99.
security
100.
security adaptation
101.
security alert prioritization
102.
security analysis
103.
security and justice (AFSJ)
104.
Security and political science
105.
security and privacy
106.
security and privacy in smart grids
107.
Security Assertion Mining
108.
security closure
109.
Security Coverage
110.
security dataset
111.
security dilemma
112.
Security evaluation
113.
security evaluation instruments
114.
Security limitations
115.
security log analysis
116.
security management
117.
security model
118.
security monitoring
119.
security notion
120.
security objectives
121.
security of data
122.
security of supply
123.
security operation center
124.
security operations center
125.
security patterns
126.
security policy
127.
security problem definition
128.
security proof
129.
security protocols
130.
security requirements
131.
security requirements engineering
132.
security risk assessment
133.
security risk management
134.
security risks
135.
security strategies
136.
security testing
137.
security training
138.
security verification
139.
security-by-design
140.
social security planning
141.
societal security
142.
system of economic security
143.
system security
144.
terrorism security
145.
transmission System Security
146.
voting privacy and security
märksõna
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
vaste
algab
lõpeb
sisaldab
reasta
Relevantsuse alusel
kasvavalt
kahanevalt
ilmumisaasta
autor
TTÜ struktuuriüksus
märksõna
seeria-sari
tema kohta
võtmesõna
Otsing
Valikud
0
ilmumisaasta
AND
OR
NOT
autor
AND
OR
NOT
TTÜ struktuuriüksus
AND
OR
NOT
märksõna
AND
OR
NOT
seeria-sari
AND
OR
NOT
tema kohta
AND
OR
NOT
võtmesõna
AND
OR
NOT