Networks and Security
181 – 190 of 260
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2020
-
Mark
5G Radio Access Network Slicing in Massive MIMO Systems for Industrial Applications
2020) The Seventh International Conference on Software Defined Systems (SDS-2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure ownership transfer for the Internet of Things
2020) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 1. p.33-44(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Massive MIMO Optimization with Compatible Sets
2019)(
- Book/Report › Report
-
Mark
Massive MIMO Optimization with Compatible Sets
(
- Contribution to journal › Article
-
Mark
SDN Access Control for the Masses
(
- Contribution to journal › Article
-
Mark
Metadata filtering for user-friendly centralized biometric authentication
(
- Contribution to journal › Article
-
Mark
Massive MIMO C-Set Optimisation
2019)(
- Non-textual form › Software
-
Mark
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
(
- Contribution to journal › Article
-
Mark
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes
2019) 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC), 2019 In Lecture Notes in Computer Science 11443. p.565-598(
- Chapter in Book/Report/Conference proceeding › Book chapter