81 – 90 of 258
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Statistical guarantee of timeliness in networks of IoT devices
2022) In Telecommunication Systems(
- Contribution to journal › Article
-
Mark
The 6G Computing Continuum (6GCC): Meeting the 6G computing challenges
2022) 1st International Conference on 6G Networking (6GNet 2022)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
2022) Proceedings of the 24th International Conference on Information and Communications Security, ICICS'22 p.589-607(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluation of Control over the Edge of a Configurable Mid-band 5G Base Station
2022) 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 In Proceedings - 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 p.83-87(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Intelligent multi-agent reinforcement learning model for resources allocation in cloud computing
(
- Contribution to journal › Article