Networks and Security
151 – 160 of 235
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2020
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Automated CPE Labeling of CVE Summaries with Machine Learning
2020) 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12223 LNCS. p.3-22(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Internet of Reliable Things: Toward D2D-enabled NB-IoT
2020) Fifth International Conference on Fog and Mobile Edge Computing (FMEC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modeling DRX for D2D Communication
(
- Contribution to journal › Article
-
Mark
Extended Analysis of Age of Information Threshold Violations
(
- Contribution to journal › Article
-
Mark
Evaluation of the HAVOSS software process maturity model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy versus throughput optimisation for machine-to-machine communication
(
- Contribution to journal › Article
-
Mark
Certification of students in non-technical engineering skills : What do the companies think?
2020) 11th International Conference on Society and Information Technologies, ICSIT 2020 In ICSIT 2020 - 11th International Conference on Society and Information Technologies, Proceedings p.49-54(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
(
- Contribution to journal › Article
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article