Networks and Security
121 – 130 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2021
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
(2021) p.520-530
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the Sample Complexity of solving LWE using BKW-Style Algorithms
(2021) 2021 IEEE International Symposium on Information Theory
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Prototyping intrusion detection in an industrial cloud-native digital twin
(2021) 2021 22nd IEEE International Conference on Industrial Technology (ICIT)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to Confidentiality and Integrity Algorithms for 5G
(2021)
- Thesis › Doctoral thesis (compilation)
-
Mark
Biased differential distinguisher – Cryptanalysis of reduced-round SKINNY
- Contribution to journal › Article
-
Mark
Evaluating the performance of the OSCORE security protocol in constrained IoT environments
- Contribution to journal › Article
-
Mark
Security framework in digital twins for cloud-based industrial control systems : intrusion detection and mitigation
(2021) 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Yggdrasil: Privacy-Aware Dual Deduplication in Multi Client Settings
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud : Unbinding Real-time Applications from Cloud-induced Delays
(2021) 2021 International Symposium on Networks, Computers and Communications, ISNCC 2021
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improvements on Making BKW Practical for Solving LWE
- Contribution to journal › Article
