Networks and Security
231 – 240 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Engaging Students using GitHub as a Learning Management System
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Ouroboros-E : An Efficient Lattice-based Key-Exchange Protocol
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Path Generation for Affine Flow Thinning
- Contribution to journal › Article
-
Mark
Error Amplification in Code-based Cryptography
(2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258
- Contribution to journal › Article
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
(2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Standard-compliant LTE-A Uplink Scheduling Scheme with Quality of Service
- Contribution to journal › Article
-
Mark
Editorial : Special issue on coding and cryptography
- Contribution to journal › Debate/Note/Editorial
-
Mark
OpenSAW: Open Security Analysis Workbench
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modifying Backoff Freezing Mechanism to Optimize Dense IEEE 802.11 Networks
- Contribution to journal › Article
