121 – 130 of 235
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2020
-
Mark
Reliability, timeliness and load reduction at the edge for cloud gaming
2020) 38th IEEE International Performance Computing and Communications Conference, IPPCCC 2019(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Digital Twin Based Industrial Automation and Control System Security Architecture
(
- Contribution to journal › Article
-
Mark
Software Defined Networking for Emergency Traffic Management in Smart Cities
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Making the BKW Algorithm Practical for LWE
2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some Notes on Post-Quantum Cryptanalysis
2020)(
- Thesis › Doctoral thesis (compilation)
-
Mark
A New Decryption Failure Attack Against HQC
2020) 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 In Lecture Notes in Computer Science 12491. p.353-382(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Certification of students in non-technical engineering skills : What do the companies think?
2020) 11th International Conference on Society and Information Technologies, ICSIT 2020 In ICSIT 2020 - 11th International Conference on Society and Information Technologies, Proceedings p.49-54(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Content and Resource Management in Edge Networks
2020)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Massive MIMO Pilot Scheduling over Cloud RAN for Industry 4.0
2020) 28 th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Electromagnetic Side-Channel Attack on AES using Low-end Equipment
(
- Contribution to journal › Article