Linked e-resources

Details

Invited Paper
How to Compartment Secrets
Trust Everybody, but Cut the Cards (Invited Talk)
Authentication
A Lattice-based Enhanced Privacy ID
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
Cryptography
Verifiable and Private Oblivious Polynomial Evaluation
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations
With an Illustration on AES
Strong Designated Verifier Signature Based on the Rank Metric
A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things
Threats
Fault Injection Characterization on modern CPUs
From the ISA to the Micro-Architecture
Threat Analysis of Poisoning Attack against Ethereum Blockchain
A Template-based Method for the Generation of Attack Trees (short paper)
Cybersecurity
Analysis of QUIC Session Establishment and its Implementations
CompactFlow: A Hybrid Binary Format for Network Flow Data
SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities
Internet of Things
Automated Security Analysis of IoT Software Updates
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper).

Browse Subjects

Show more subjects...

Statistics

from
to
Export