1 – 13 of 13
- show: 250
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
2022) Proceedings of the 24th International Conference on Information and Communications Security, ICICS'22 p.589-607(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to Securing Software Updates in IoT
2022)(
- Thesis › Doctoral thesis (compilation)
-
Mark
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
2022) The 17th International Conference on Information Security Practice and Experience (ISPEC 2022) In Lecture Notes in Computer Science 13620.(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
2021) EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On-demand Key Distribution for Cloud Networks
2021) 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
Software Defined Networking for Emergency Traffic Management in Smart Cities
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Recommender System for User-Specific Vulnerability Scoring
2020) 14th International Conference on Risk and Security of Internet and Systems, CRISIS 2019 In Lecture Notes in Computer Science 12026. p.355-364(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy Consumption for Securing Lightweight IoT Protocols
2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the Suitability of Using SGX for Secure Key Storage in the Cloud
2020) 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus2020 12395. p.32-47(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Survey of Published Attacks on Intel SGX
2020)(
- Book/Report › Report
- 2019
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
- 2018
-
Mark
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
2018) International Conference on on Product-Focused Software Process Improvement (PROFES 2018) In Lecture Notes in Computer Science 11271. p.81-97(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding