71 – 80 of 235
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Contributions to Securing Software Updates in IoT
2022)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Insight of Anomaly Detection with NWDAF in 5G
2022) 2022 International Conference on Computer, Information and Telecommunication Systems (CITS)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Post-Quantum Cryptography : 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
- Book/Report › Conference proceeding (editor)
-
Mark
Attacks on the Firekite Cipher
(
- Contribution to journal › Article
-
Mark
Detection and mitigation of deception attacks on cloud-based industrial control systems
2022) 25th Conference on Innovation in Clouds, Internet and Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
CatNap : Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party
2022) 19th International Conference on Security and Cryptography, SECRYPT 2022 In Proceedings of the International Conference on Security and Cryptography 1. p.237-248(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Bifrost : A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding