Networks and Security
31 – 40 of 261
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Intelligent Crossroads Testbed : Toward Autonomous Intersection Management Systems
(2024) 10th International Conference on Control, Decision and Information Technologies, CoDIT 2024 p.181-186
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Context Committing Security of Leveled Leakage-Resilient AEAD
- Contribution to journal › Article
-
Mark
Cybersecurity Education in Universities : A Comprehensive Guide to Curriculum Development
- Contribution to journal › Article
-
Mark
Tight Security of TNT and Beyond : Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
(2024) 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14651 LNCS. p.249-279
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further improvements of the estimation of key enumeration with applications to solving LWE
- Contribution to journal › Article
-
Mark
VNN : verification-friendly neural networks with hard robustness guarantees
(2024) 41st International Conference on Machine Learning, ICML 2024 In Proceedings of Machine Learning Research 235. p.2846-2856
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Regaining Dominance in CIDER and Lazarus
- Contribution to journal › Article
-
Mark
AutoML in the Face of Adversity: Securing Mobility Predictions in NWDAF
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
- Contribution to journal › Article
- 2023
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
- Contribution to journal › Article
