1 – 10 of 55
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2020
-
Mark
The security implications of quantum cryptography and quantum computing
(
- Contribution to journal › Article
- 2019
-
Mark
Facilitating online trust with Blockchains
(
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Key technology choices for optimal massive IoT devices
(
- Contribution to specialist publication or newspaper › Specialist publication article
- 2017
-
Mark
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
(
- Contribution to journal › Article
- 2016
-
Mark
Cryptography in an all encrypted world
(
- Contribution to journal › Article
- 2015
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Relevans av tekniskt skydd för tillit
2014) p.47-51(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Trusted computing for infrastructure
(
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Keyed logic BIST for Trojan detection in SoC
2014) 2014 16th International Symposium on System-on-Chip, SoC 2014 In 2014 International Symposium on System-on-Chip, SoC 2014(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding