11 – 20 of 51
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
2022) 8th International Conference on Information Systems Security and Privacy, ICISSP 2022 p.145-153(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
Faster enclave transitions for IO-intensive network applications
2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On-demand Key Distribution for Cloud Networks
2021) 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Yggdrasil: Privacy-Aware Dual Deduplication in Multi Client Settings
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
2021) p.520-530(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
ComPOS - a Domain-Specific Language for Composing Internet-of-Things Systems
2021)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
2021) EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Precise Framework for Source-Level Control-Flow Analysis
2021) IEEE 21st International Working Conference on Source Code Analysis and Manipulation (SCAM) p.1-11(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding