Networks and Security
41 – 50 of 228
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2022
-
Mark
CatNap : Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party
2022) 19th International Conference on Security and Cryptography, SECRYPT 2022 In Proceedings of the International Conference on Security and Cryptography 1. p.237-248(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Light Signaling Approach to Node Grouping for Massive MIMO IoT Networks
(
- Contribution to journal › Article
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
Statistical guarantee of timeliness in networks of IoT devices
2022) In Telecommunication Systems(
- Contribution to journal › Article
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding