Networks and Security
1 – 100 of 239
- show: 100
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Interpretable machine learning for predicting the fate and transport of pentachlorophenol in groundwater
(
- Contribution to journal › Article
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme
2024)(
- Thesis › Licentiate thesis
-
Mark
Further improvements of the estimation of key enumeration with applications to solving LWE
2024) In Cryptography and Communications(
- Contribution to journal › Article
-
Mark
Tight Security of TNT and Beyond : Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
2024) 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14651 LNCS. p.249-279(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
VNN: Verification-Friendly Neural Networks with Hard Robustness Guarantees
2024) 41st International Conference on Machine Learning, ICML 2024 In Proceedings of Machine Learning Research 235. p.2846-2856(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast Parallelizable Misuse-Resistant Authenticated Encryption : Low Latency (Decryption-Fast) SIV
2024) Selected Areas in Cryptography 2024(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
CCA Security with Short AEAD Tags
(
- Contribution to journal › Article
-
Mark
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO †
(
- Contribution to journal › Article
-
Mark
Resilient Cloud Control System: Dynamic Frequency Adaptation via Q-learning
2024) 27th Conference on Innovation in Clouds, Internet and Networks, ICIN(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Context Committing Security of Leveled Leakage-Resilient AEAD
(
- Contribution to journal › Article
-
Mark
Cybersecurity Education in Universities : A Comprehensive Guide to Curriculum Development
(
- Contribution to journal › Article
-
Mark
Scalable Intelligent Traffic Balancing: Advancing Efficiency, Safety, and Sustainability in Urban Transportation Through Machine Learning and AIM Integration
2024) 2023 IEEE Global Conference on Artificial Intelligence and Internet of Things, GCAIoT(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Impact of Positioning Uncertainty on Autonomous Intersection Management System
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Non-Fungible Tokens as a Framework for Sustainable Innovation in Pharmaceutical R&D: A Smart Contract-Based Platform for Data Sharing and Rightsholder Protection
(
- Contribution to journal › Article
- 2023
-
Mark
Scheduling for Industrial Control Traffic Using Massive MIMO and Large Intelligent Surfaces
2023) 13th International Workshop on Resilient Networks Design and Modeling, RNDM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack
2023) 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS) p.659-666(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Attacks Against Mobility Prediction in 5G Networks
2023) 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023 p.1502-1511(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Towards Practical Cell-Free 6G Network Deployments: An Open-Source End-to-End Ray Tracing Simulator
2023) Asilomar(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Access Security Policy Generation for Containers as a Cloud Service
(
- Contribution to journal › Article
-
Mark
An Open Dataset Storage Standard for 6G Testbeds
2023) p.347-352(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Lightweight Machine Learning for Seizure Detection on Wearable Devices
2023) IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2023)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Attack Resilient Cloud-Based Control Systems for Industry 4.0
(
- Contribution to journal › Article
-
Mark
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
2023)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
SafeDeep: A Scalable Robustness Verification Framework for Deep Neural Networks
2023) IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing
2023) 24th Privacy Enhancing Technologies Symposium, PETS 2024(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
PAPR : Publicly Auditable Privacy Revocation for Anonymous Credentials
2023) Cryptographers’ Track at the RSA Conference, CT-RSA 2023 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13871 LNCS. p.163-190(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
(2023) The 14th International Conference on Post-Quantum Cryptography In Lecture Notes in Computer Science 14154.
- Book/Report › Conference proceeding (editor)
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Performance Evaluation of QUIC vs TCP for Cloud Control Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cooperative Vehicles versus Non-Cooperative Traffic Light : Safe and Efficient Passing
(
- Contribution to journal › Article
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
(
- Contribution to journal › Article
-
Mark
PrSLoc : Sybil attack detection for localization with private observers using differential privacy
(
- Contribution to journal › Article
-
Mark
Improved Estimation of Key Enumeration with Applications to Solving LWE
2023) 2023 International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
(
- Contribution to journal › Article
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(
- Contribution to journal › Article
-
Mark
Efficient Security Protocols for Constrained Devices
2023) In EIT series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
EpilepsyNet: Interpretable Self-Supervised Seizure Detection for Low-Power Wearable Systems
2023) 5th IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Decryption Failure Attacks on Post-Quantum Cryptography
2023) In Series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
-
Mark
A Safe and Robust Autonomous Intersection Management System Using a Hierarchical Control Strategy and V2I Communication
(
- Contribution to journal › Article
-
Mark
Constructive Dissonance in the Cloud: Adaptive Out-of-Phase Scheduling for Periodic Tasks
2023) International Conference on Cloud Networking(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Taming Cloud Integrated Systems in the Wild
2023)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Preface
2023) Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, Proceedings In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14154 LNCS.(
- Chapter in Book/Report/Conference proceeding › Preface to conference proceeding
-
Mark
Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key
2023) IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communication, TrustCom 2023 p.1718-1727(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2022
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
2022) 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022 In International Conference on Communication Systems and Networks p.129-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The 6G Computing Continuum (6GCC): Meeting the 6G computing challenges
2022) 1st International Conference on 6G Networking (6GNet 2022)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Statistical guarantee of timeliness in networks of IoT devices
2022) In Telecommunication Systems(
- Contribution to journal › Article
-
Mark
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
2022) Proceedings of the 24th International Conference on Information and Communications Security, ICICS'22 p.589-607(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Intelligent multi-agent reinforcement learning model for resources allocation in cloud computing
(
- Contribution to journal › Article
-
Mark
Dynamic Federations for 6G Cell-Free Networking: Concepts and Terminology
2022) International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Progressive and efficient verification for digital signatures
2022) 20th International Conference on Applied Cryptography and Network Security, ACNS 2022 In Lecture Notes in Computer Science 13269. p.440-458(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Outsourcing MPC Precomputation for Location Privacy
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
2022) 8th International Conference on Information Systems Security and Privacy, ICISSP 2022 p.145-153(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SGX-Bundler: speeding up enclave transitions for IO-intensive applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Post-Quantum Cryptography : 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
- Book/Report › Conference proceeding (editor)
-
Mark
Attacks on the Firekite Cipher
(
- Contribution to journal › Article
-
Mark
CatNap : Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party
2022) 19th International Conference on Security and Cryptography, SECRYPT 2022 In Proceedings of the International Conference on Security and Cryptography 1. p.237-248(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluation of Control over the Edge of a Configurable Mid-band 5G Base Station
2022) 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 In Proceedings - 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 p.83-87(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing
2022) 2022 IEEE International Symposium on Secure and Private Execution Environment Design p.109-120(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
2022) The 17th International Conference on Information Security Practice and Experience (ISPEC 2022) In Lecture Notes in Computer Science 13620.(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
Preface
2022) 13th International Conference on Post-Quantum Cryptography, PQCrypto 2022 In Lecture Notes in Computer Science 13512 LNCS.(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Bifrost : A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Light Signaling Approach to Node Grouping for Massive MIMO IoT Networks
(
- Contribution to journal › Article
-
Mark
Detection and mitigation of deception attacks on cloud-based industrial control systems
2022) 25th Conference on Innovation in Clouds, Internet and Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to Securing Software Updates in IoT
2022)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Insight of Anomaly Detection with NWDAF in 5G
2022) 2022 International Conference on Computer, Information and Telecommunication Systems (CITS)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Finding Collisions against 4-Round SHA-3-384 in Practical Time
(
- Contribution to journal › Article
-
Mark
Prediction and exposure of delays from a base station perspective in 5G and beyond networks
2022) 2022 ACM SIGCOMM Workshop on 5G and Beyond Network Measurements, Modeling, and Use Cases, 5G-MeMU 2022, co-located with ACM SIGCOMM 2022 In 5G-MeMU 2022 - Proceedings of the ACM SIGCOMM 2022 Workshop on 5G and Beyond Network Measurements, Modeling, and Use Cases - Part of SIGCOMM 2022 p.8-14(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
LbSP : Load-Balanced Secure and Private Autonomous Electric Vehicle Charging Framework With Online Price Optimization
(
- Contribution to journal › Article
- 2021
-
Mark
A Permissioned Blockchain-based System for Collaborative Drug Discovery
2021) 7th International Conference on Information Systems Security and Privacy, ICISSP 2021 p.121-132(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Decentralized Dynamic PKI based on Blockchain
2021) The 36th ACM/SIGAPP Symposium on Applied Computing, SAC '21(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Prototyping intrusion detection in an industrial cloud-native digital twin
2021) 2021 22nd IEEE International Conference on Industrial Technology (ICIT)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Joint Fog Service Placement and Scheduling for 5G-Enabled IoT, a Q-Learning Approach
2021) In IEEE Transactions on Cognitive Communications and Networking(
- Contribution to journal › Article
-
Mark
Energy-Efficient Stable and Balanced Task Scheduling in Data Centers
(
- Contribution to journal › Article
-
Mark
Enhancing Resilience of FSO Networks to Adverse Weather Conditions
(
- Contribution to journal › Article
-
Mark
Biased differential distinguisher – Cryptanalysis of reduced-round SKINNY
(
- Contribution to journal › Article
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
-
Mark
Contributions to Confidentiality and Integrity Algorithms for 5G
2021)(
- Thesis › Doctoral thesis (compilation)
-
Mark
On-demand Key Distribution for Cloud Networks
2021) 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Lic-Sec: An enhanced AppArmor Docker security profile generator
(
- Contribution to journal › Article
-
Mark
AppArmor Profile Generator as a Cloud Service
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Demonstration: A cloud-control system equipped with intrusion detection and mitigation
2021) The Conference on Networked Systems (NetSys 2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Faster enclave transitions for IO-intensive network applications
2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding