11 – 20 of 78
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2019
-
Mark
Guarding the Guards: Accountable Authorities in VANETs
2019) 2018 IEEE Vehicular Networking Conference (VNC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An AEAD Variant of the Grain Stream Cipher
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
-
Mark
Efficient Hardware Implementations of Grain-128AEAD
2019) 20th International Conference on Cryptology in India, INDOCRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11898 LNCS. p.495-513(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2018
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
2018) International Conference on on Product-Focused Software Process Improvement (PROFES 2018) In Lecture Notes in Computer Science 11271. p.81-97(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding