Networks and Security
1 – 10 of 164
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Statistical guarantee of timeliness in networks of IoT devices
2022) In Telecommunication Systems(
- Contribution to journal › Article
-
Mark
The 6G Computing Continuum (6GCC): Meeting the 6G computing challenges
2022) 1st International Conference on 6G Networking (6GNet 2022)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
2022) Proceedings of the 24th International Conference on Information and Communications Security, ICICS'22(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detection and mitigation of deception attacks on cloud-based industrial control systems
2022) 25th Conference on Innovation in Clouds, Internet and Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
SGX-Bundler: speeding up enclave transitions for IO-intensive applications
2022) The 22nd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
2022) 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022 In International Conference on Communication Systems and Networks p.129-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding