221 – 230 of 235
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2017
-
Mark
Coded-BKW with Sieving
2017) 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2017 In Lecture Notes in Computer Science 10624. p.323-346(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
OpenSAW: Open Security Analysis Workbench
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A reaction attack on the QC-LDPC mceliece cryptosystem
2017) 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10346 LNCS. p.51-68(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An Online Placement Mechanism for Efficient Delivery of User Generated Content
2017) IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD) In IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improving Throughput and Minimizing Age of Information in dense WLANs, Using Cooperative Techniques
2017) In Series of licentiate and doctoral theses(
- Thesis › Licentiate thesis
- 2016
-
Mark
Packet routing and frame length optimization in wireless mesh networks with multicast communications
2016) 17th International Telecommunications Network Strategy and Planning Symposium, Networks 2016(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Effect of Hidden Terminal Interference on Safety-Critical Traffic in Vehicular Ad Hoc Networks
2016) 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications p.75-82(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Autonomy in PhD-education – Supervising for Independence
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems
2016)(
- Thesis › Doctoral thesis (compilation)