Networks and Security
1 – 10 of 239
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Non-Fungible Tokens as a Framework for Sustainable Innovation in Pharmaceutical R&D: A Smart Contract-Based Platform for Data Sharing and Rightsholder Protection
(
- Contribution to journal › Article
-
Mark
Impact of Positioning Uncertainty on Autonomous Intersection Management System
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Scalable Intelligent Traffic Balancing: Advancing Efficiency, Safety, and Sustainability in Urban Transportation Through Machine Learning and AIM Integration
2024) 2023 IEEE Global Conference on Artificial Intelligence and Internet of Things, GCAIoT(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Tight Security of TNT and Beyond : Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
2024) 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14651 LNCS. p.249-279(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further improvements of the estimation of key enumeration with applications to solving LWE
2024) In Cryptography and Communications(
- Contribution to journal › Article
-
Mark
VNN: Verification-Friendly Neural Networks with Hard Robustness Guarantees
2024) 41st International Conference on Machine Learning, ICML 2024 In Proceedings of Machine Learning Research 235. p.2846-2856(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast Parallelizable Misuse-Resistant Authenticated Encryption : Low Latency (Decryption-Fast) SIV
2024) Selected Areas in Cryptography 2024(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
CCA Security with Short AEAD Tags
(
- Contribution to journal › Article
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding