Networks and Security
1 – 10 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
Formal Analysis of Julia Key Agreement Protocol
2025) 26th International Conference on Information and Communications Security, ICICS 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 15057 LNCS. p.171-190(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
2025)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
(
- Contribution to journal › Article
-
Mark
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD : More Applications of Pseudo-Random Injections
(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
A Trust Establishment and Key Management Architecture for Hospital-at-Home
(
- Contribution to journal › Article
-
Mark
On the Trustworthiness of Trusted Third Parties
2025) In Series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
- 2024
-
Mark
Non-Fungible Tokens as a Framework for Sustainable Innovation in Pharmaceutical R&D: A Smart Contract-Based Platform for Data Sharing and Rightsholder Protection
(
- Contribution to journal › Article
-
Mark
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO †
(
- Contribution to journal › Article
-
Mark
On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme
2024)(
- Thesis › Licentiate thesis
-
Mark
Context Committing Security of Leveled Leakage-Resilient AEAD
(
- Contribution to journal › Article