21 – 30 of 78
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
2018) International Conference on on Product-Focused Software Process Improvement (PROFES 2018) In Lecture Notes in Computer Science 11271. p.81-97(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Espresso: A stream cipher for 5G wireless communication systems
(
- Contribution to journal › Article
-
Mark
Blockchain-based publishing layer for the Keyless Signing Infrastructure
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Greedy Nonrandomness Detectors for Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
Exploiting Trust in Deterministic Builds
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Enabling Key Migration Between Non-Compatible TPM Versions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding