Secure and Networked Systems
11 – 20 of 60
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
Fast Parallelizable Misuse-Resistant Authenticated Encryption : Low Latency (Decryption-Fast) SIV
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Trust Establishment and Key Management Architecture for Hospital-at-Home
- Contribution to journal › Article
-
Mark
Binary Forward-Only Algorithms
- Contribution to journal › Article
-
Mark
Demystifying AMD SEV Performance Penalty for NFV Deployment
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Integrating smooth motion assumptions with RANSAC-based sound source localization
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Robustness and Privacy Interplay in Patient Membership Inference
(2025)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Formal Local Implication Between Two Neural Networks
(2025)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Number of the Beast : Reducing Additions in Fast Matrix Multiplication Algorithms for Dimensions up to 666
(2025) p.47-60
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Authentication, from an Information Theoretic Perspective
(2025) p.165-168
- Chapter in Book/Report/Conference proceeding › Entry for encyclopaedia/dictionary
-
Mark
A Generic Framework for Side-Channel Attacks Against LWE-Based Cryptosystems
(2025) 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025 In Lecture Notes in Computer Science 15608. p.3-32
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
