221 – 230 of 261
      - show: 10
- |
- sort: year (new to old)
        Close
        
            
    
    Embed this list
<iframe src=""
              width=""
              height=""
              allowtransparency="true"
              frameborder="0">
            </iframe>
        - 2018
- 
                        Mark
        Practical Attacks on Relational Databases Protected via Searchable Encryption
    (2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Error Amplification in Code-based Cryptography
    (2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258- Contribution to journal › Article
 
- 
                        Mark
        A Routing Protocol for LoRA Mesh Networks
    (2018) Seventh IEEE WoWMoM Workshop on the Internet of Things: Smart Objects and Services (IoT-SoS)- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Protecting Wireless Mesh Networks Against Adverse Weather Conditions
    (2018) 10th International Workshop on Resilient Networks Design and Modeling (RNDM)- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
    
    - Contribution to journal › Article
 
- 
                        Mark
        Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
    (2018)- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Evaluating Security of Software Through Vulnerability Metrics
    
    - Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Trust Anchors in Software Defined Networks
    (2018) European Symposium on Research in Computer Security In Lecture Notes in Computer Science 11009. p.485-505- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
    
    - Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Not so greedy : Enhanced subset exploration for nonrandomness detectors
    (2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
