1 – 37 of 37
- show: 100
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2023
-
Mark
A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack
2023) 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS) p.659-666(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key
2023) IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communication, TrustCom 2023 p.1718-1727(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Attacks Against Mobility Prediction in 5G Networks
2023) 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023 p.1502-1511(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Access Security Policy Generation for Containers as a Cloud Service
(
- Contribution to journal › Article
- 2022
-
Mark
Insight of Anomaly Detection with NWDAF in 5G
2022) 2022 International Conference on Computer, Information and Telecommunication Systems (CITS)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
2022) 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022 In International Conference on Communication Systems and Networks p.129-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2021
-
Mark
Prototyping intrusion detection in an industrial cloud-native digital twin
2021) 2021 22nd IEEE International Conference on Industrial Technology (ICIT)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Lic-Sec: An enhanced AppArmor Docker security profile generator
(
- Contribution to journal › Article
-
Mark
AppArmor Profile Generator as a Cloud Service
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Decentralized Dynamic PKI based on Blockchain
2021) The 36th ACM/SIGAPP Symposium on Applied Computing, SAC '21(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Demonstration : A cloud-native digital twin with adaptive cloud-based control and intrusion detection
(
- Contribution to journal › Article
-
Mark
X-Pro : Distributed XDP Proxies Against Botnets of Things
2021) 26th Nordic Conference on Secure IT Systems, NordSec 2021 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13115 LNCS. p.51-71(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
A Digital Twin Based Industrial Automation and Control System Security Architecture
(
- Contribution to journal › Article
-
Mark
Secure ownership transfer for the Internet of Things
2020) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 1. p.33-44(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
CLI-DOS : Collaborative Counteraction against Denial of Service in the Internet of Things
2020) 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
SDN Access Control for the Masses
(
- Contribution to journal › Article
-
Mark
Metadata filtering for user-friendly centralized biometric authentication
(
- Contribution to journal › Article
-
Mark
An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics
2019) 2019 IEEE International Conference on Big Data, Big Data 2019 In Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019 p.5744-5753(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2018
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
A secure group-based AKA protocol for machine-type communications
2017) 19th International Conference on Information Security and Cryptology, ICISC 2016 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10157 LNCS. p.3-27(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
IoT protection through device to cloud synchronization
2017) 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016 p.527-532(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Providing User Security Guarantees in Public Infrastructure Clouds
(
- Contribution to journal › Article
-
Mark
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake
(
- Contribution to journal › Article
-
Mark
Bootstrapping trust in software defined networks
(
- Contribution to journal › Article
-
Mark
Searchable Encrypted Relational Databases: Risks and Countermeasures
(
- Contribution to specialist publication or newspaper › Specialist publication article
- 2016
-
Mark
Executing Boolean queries on an encrypted Bitmap index
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure
2016) 12th International Conference, SecureComm 2016 In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 198. p.104-124(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Threats to 5G group-based authentication
2016) 13th International Conference on Security and Cryptography, SECRYPT 2016 - Part of the 13th International Joint Conference on e-Business and Telecommunications, ICETE 2016 4. p.360-367(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A high assurance virtualization platform for ARMv8
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2011
-
Mark
Efficient data integrity protection
2011) 8036380(
- Patent › Patent
- 2009
-
Mark
Loading data into a mobile terminal
2009) 7558953(
- Patent › Patent
- 1997
-
Mark
Topics in Authentication Theory
1997)(
- Thesis › Doctoral thesis (monograph)
-
Mark
Fast message authentication using efficient polynomial evaluation
1997) 4th International Workshop on Fast Software Encryption, FSE 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1267. p.190-204(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast authentication codes based on random polynomial residue classes
1997) 1997 IEEE International Symposium on Information Theory, ISIT 1997 In IEEE International Symposium on Information Theory - Proceedings p.175-175(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol
1994) 14th annual cryptographic conference CRYPTO '94 In Lecture Notes in Computer Science 839. p.121-128(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding