Networks and Security
21 – 30 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
The Perils of Limited Key Reuse: Adaptive and Parallel Mismatch Attacks with Post-processing Against Kyber
(
- Contribution to journal › Article
-
Mark
AutoML in the Face of Adversity: Securing Mobility Predictions in NWDAF
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing
2024) 24th Privacy Enhancing Technologies Symposium, PETS 2024 In Proceedings on Privacy Enhancing Technologies 2024(1). p.330-342(
- Contribution to journal › Article
-
Mark
Regaining Dominance in CIDER and Lazarus
(
- Contribution to journal › Article
-
Mark
Connected Autonomous Driving Using Reconfigurable Intelligent Metasurfaces
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Non-technical skills in engineering education as a concept
2024) In International Journal of Continuing Engineering Education and Life-Long Learning 34(6). p.577-599(
- Contribution to journal › Article