Networks and Security
61 – 70 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management Systems
(2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Performance Evaluation of QUIC vs TCP for Cloud Control Systems
(2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins
(2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
EpilepsyNet: Interpretable Self-Supervised Seizure Detection for Low-Power Wearable Systems
(2023) 5th IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2023
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
PrSLoc : Sybil attack detection for localization with private observers using differential privacy
- Contribution to journal › Article
-
Mark
Improved Estimation of Key Enumeration with Applications to Solving LWE
(2023) 2023 International Symposium on Information Theory
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
- Contribution to journal › Article
