Networks and Security
181 – 190 of 228
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2019
-
Mark
Metadata filtering for user-friendly centralized biometric authentication
(
- Contribution to journal › Article
-
Mark
An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics
2019) 2019 IEEE International Conference on Big Data, Big Data 2019 In Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019 p.5744-5753(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Wireless Body Area Networks: Security Issues and Challenges
2019) Øresund Security Day(
- Contribution to conference › Abstract
-
Mark
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
2019)(
- Working paper/Preprint › Preprint in preprint archive
- 2018
-
Mark
A Routing Protocol for LoRA Mesh Networks
2018) Seventh IEEE WoWMoM Workshop on the Internet of Things: Smart Objects and Services (IoT-SoS)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Protecting Wireless Mesh Networks Against Adverse Weather Conditions
2018) 10th International Workshop on Resilient Networks Design and Modeling (RNDM)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding