1 – 10 of 57
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2025
-
Mark
Authentication, from an Information Theoretic Perspective
(2025) p.165-168
- Chapter in Book/Report/Conference proceeding › Entry for encyclopaedia/dictionary
- 2022
-
Mark
KEYLESS SIGNATURE INFRASTRUCTURE BASED VIRTUAL MACHINE INTEGRITY
(2022) EP3317875B1
- Patent › Patent
- 2020
-
Mark
The security implications of quantum cryptography and quantum computing
- Contribution to journal › Article
- 2019
-
Mark
Facilitating online trust with Blockchains
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Key technology choices for optimal massive IoT devices
- Contribution to specialist publication or newspaper › Specialist publication article
- 2017
-
Mark
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
- Contribution to journal › Article
- 2016
-
Mark
Cryptography in an all encrypted world
- Contribution to journal › Article
- 2015
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
(2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Relevans av tekniskt skydd för tillit
(2014) p.47-51
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
