1 – 3 of 3
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2018
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Improved Greedy Nonrandomness Detectors for Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
Enabling Key Migration Between Non-Compatible TPM Versions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding