Networks and Security
21 – 30 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Non-technical skills in engineering education as a concept
(2024) In International Journal of Continuing Engineering Education and Life-Long Learning 34(6). p.577-599
- Contribution to journal › Article
-
Mark
Interpretable machine learning for predicting the fate and transport of pentachlorophenol in groundwater
- Contribution to journal › Article
-
Mark
uKNIT: Breaking Round-alignment for Cipher Design : Featuring uKNIT-BC, an Ultra Low-Latency Block Cipher
- Working paper/Preprint › Preprint in preprint archive
-
Mark
Energy Reduction in Cell-Free Massive MIMO through Fine-Grained Resource Management
(2024) 2024 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit 2024 In 2024 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit 2024 p.547-552
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
CoopeRIS : A framework for the simulation of reconfigurable intelligent surfaces in cooperative driving environments
- Contribution to journal › Article
-
Mark
Intelligent Crossroads Testbed : Toward Autonomous Intersection Management Systems
(2024) 10th International Conference on Control, Decision and Information Technologies, CoDIT 2024 p.181-186
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Regaining Dominance in CIDER and Lazarus
- Contribution to journal › Article
-
Mark
AutoML in the Face of Adversity: Securing Mobility Predictions in NWDAF
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
- Contribution to journal › Article
