91 – 100 of 264
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
(2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
(2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827
- Contribution to journal › Article
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluation of Control over the Edge of a Configurable Mid-band 5G Base Station
(2022) 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 In Proceedings - 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 p.83-87
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to Securing Software Updates in IoT
(2022)
- Thesis › Doctoral thesis (compilation)
-
Mark
Insight of Anomaly Detection with NWDAF in 5G
(2022) 2022 International Conference on Computer, Information and Telecommunication Systems (CITS)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
(2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Detection and mitigation of deception attacks on cloud-based industrial control systems
(2022) 25th Conference on Innovation in Clouds, Internet and Networks
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
(2022) 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022 In International Conference on Communication Systems and Networks p.129-137
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
(2022) p.84-95
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
