Networks and Security
41 – 50 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Scalable Intelligent Traffic Balancing: Advancing Efficiency, Safety, and Sustainability in Urban Transportation Through Machine Learning and AIM Integration
(2024) 2023 IEEE Global Conference on Artificial Intelligence and Internet of Things, GCAIoT
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2023
-
Mark
A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack
(2023) 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS) p.659-666
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key
(2023) IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communication, TrustCom 2023 p.1718-1727
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Attacks Against Mobility Prediction in 5G Networks
(2023) 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023 p.1502-1511
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(2023) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2023(1). p.89-112
- Contribution to journal › Article
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
- Contribution to journal › Article
-
Mark
Decryption Failure Attacks on Post-Quantum Cryptography
(2023) In Series of licentiate and doctoral theses
- Thesis › Doctoral thesis (compilation)
-
Mark
Improved Estimation of Key Enumeration with Applications to Solving LWE
(2023) 2023 International Symposium on Information Theory
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
- Contribution to journal › Article
