161 – 170 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2020
-
Mark
Security Solutions for Constrained Devices in Cyber-Physical Systems
2020) In Series of licentiate and doctoral theses(
- Thesis › Licentiate thesis
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An overview of cryptographic primitives for possible use in 5G and beyond
(
- Contribution to journal › Scientific review
-
Mark
CLI-DOS : Collaborative Counteraction against Denial of Service in the Internet of Things
2020) 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Internet of Reliable Things: Toward D2D-enabled NB-IoT
2020) Fifth International Conference on Fog and Mobile Edge Computing (FMEC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modeling DRX for D2D Communication
(
- Contribution to journal › Article
-
Mark
Energy versus throughput optimisation for machine-to-machine communication
(
- Contribution to journal › Article
-
Mark
Automated CPE Labeling of CVE Summaries with Machine Learning
2020) 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12223 LNCS. p.3-22(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
(
- Contribution to journal › Article
-
Mark
Extended Analysis of Age of Information Threshold Violations
(
- Contribution to journal › Article