71 – 80 of 264
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
Performance Evaluation of QUIC vs TCP for Cloud Control Systems
(2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins
(2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cooperative Vehicles versus Non-Cooperative Traffic Light : Safe and Efficient Passing
- Contribution to journal › Article
-
Mark
Attack Resilient Cloud-Based Control Systems for Industry 4.0
- Contribution to journal › Article
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
- Contribution to journal › Article
-
Mark
Improved Estimation of Key Enumeration with Applications to Solving LWE
(2023) 2023 International Symposium on Information Theory
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2022
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
(2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
(2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
(2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827
- Contribution to journal › Article
