Networks and Security
231 – 240 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
(2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Ouroboros-E : An Efficient Lattice-based Key-Exchange Protocol
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy-Optimal Data Aggregation and Dissemination for the Internet of Things
- Contribution to journal › Article
-
Mark
Engaging Students using GitHub as a Learning Management System
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Social Norms and the Dominance of Low-Doers
- Contribution to journal › Article
- 2017
-
Mark
Standard-compliant LTE-A Uplink Scheduling Scheme with Quality of Service
- Contribution to journal › Article
-
Mark
Editorial : Special issue on coding and cryptography
- Contribution to journal › Debate/Note/Editorial
-
Mark
Searchable Encrypted Relational Databases: Risks and Countermeasures
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Bootstrapping trust in software defined networks
- Contribution to journal › Article
-
Mark
An optimization model for affine flow thinning - A traffic protection mechanism for FSO networks
(2017) 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
