211 – 220 of 260
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2019
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
-
Mark
Analysis of Age of Information threshold violations
2019) 22nd ACM International Conference on Modeling, Analysis(
and Simulation of Wireless and Mobile Systems- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Protecting OpenFlow Flow Tables with Intel SGX
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Privacy-enabled Recommendations for Software Vulnerabilities
2019) 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
2019)(
- Working paper/Preprint › Preprint in preprint archive
- 2018
-
Mark
A Routing Protocol for LoRA Mesh Networks
2018) Seventh IEEE WoWMoM Workshop on the Internet of Things: Smart Objects and Services (IoT-SoS)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Protecting Wireless Mesh Networks Against Adverse Weather Conditions
2018) 10th International Workshop on Resilient Networks Design and Modeling (RNDM)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article