191 – 200 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2019
-
Mark
Protecting OpenFlow Flow Tables with Intel SGX
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis of Age of Information threshold violations
2019) 22nd ACM International Conference on Modeling, Analysis(
and Simulation of Wireless and Mobile Systems- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Metadata filtering for user-friendly centralized biometric authentication
(
- Contribution to journal › Article
-
Mark
Massive MIMO C-Set Optimisation
2019)(
- Non-textual form › Software
-
Mark
An AEAD Variant of the Grain Stream Cipher
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving
2019) Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Online Learning and Placement Algorithms for Efficient Delivery of User Generated Contents in Telco-CDNs
(
- Contribution to journal › Article
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article
-
Mark
Massive MIMO Optimization with Compatible Sets
2019)(
- Book/Report › Report