221 – 230 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Protecting Wireless Mesh Networks Against Adverse Weather Conditions
2018) 10th International Workshop on Resilient Networks Design and Modeling (RNDM)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Ouroboros-E : An Efficient Lattice-based Key-Exchange Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
(
- Contribution to journal › Article
-
Mark
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
2018) International Conference on on Product-Focused Software Process Improvement (PROFES 2018) In Lecture Notes in Computer Science 11271. p.81-97(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Trust Anchors in Software Defined Networks
2018) European Symposium on Research in Computer Security In Lecture Notes in Computer Science 11009. p.485-505(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding