Linked e-resources
Details
Table of Contents
Quantum-resistant MACsec and IPsec for Virtual Private Networks
Post-Quantum Security for the Extended Access Control Protocol
A study of KEM generalizations
Vision Paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments
On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT
SoK: Anonymous Credentials.
Post-Quantum Security for the Extended Access Control Protocol
A study of KEM generalizations
Vision Paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments
On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT
SoK: Anonymous Credentials.