21 – 30 of 38
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Bootstrapping trust in software defined networks
(
- Contribution to journal › Article
-
Mark
IoT protection through device to cloud synchronization
2017) 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 p.527-532(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Providing User Security Guarantees in Public Infrastructure Clouds
(
- Contribution to journal › Article
-
Mark
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
(
- Contribution to journal › Article
-
Mark
Searchable Encrypted Relational Databases: Risks and Countermeasures
(
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
A secure group-based AKA protocol for machine-type communications
2017) 19th International Conference on Information Security and Cryptology, ICISC 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10157 LNCS. p.3-27(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2016
-
Mark
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure
2016) 12th International Conference, SecureComm 2016 In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 198. p.104-124(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Threats to 5G group-based authentication
2016) 13th International Conference on Security and Cryptography, SECRYPT 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016 4. p.360-367(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Executing Boolean queries on an encrypted Bitmap index
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding