Secure and Networked Systems
21 – 30 of 35
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluation of 5G Readiness for Critical Control of Remote Devices
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Enhancing Autonomous Vehicles System Security : Advanced Attack Detection for Robust Safeguarding
2024) 10th International Conference on Control, Decision and Information Technologies, CoDIT 2024 p.730-737(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Regaining Dominance in CIDER and Lazarus
(
- Contribution to journal › Article
-
Mark
AutoML in the Face of Adversity: Securing Mobility Predictions in NWDAF
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Privacy-Preserving Federated Interpretability
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
(
- Contribution to journal › Article
-
Mark
Analysis and design of a GHz bandwidth adaptive bias circuit for an mmW Doherty amplifier
(
- Contribution to journal › Article