Post-quantum kryptografi: CSIDH |
22. okt. 2021 |
|
Security and Privacy of Media Capturing |
21. okt. 2021 |
|
From VLAN separation to microsegmentation and NSX in a large-scale environment |
21. okt. 2021 |
|
Visualization of Threat Intelligence |
31. aug. 2021 |
|
Developing a Tool for Annotating Threat Reports |
31. aug. 2021 |
|
Security Analysis Methods and Tools |
23. aug. 2021 |
|
Classifying Rogue Access Points with Semantic Graph Artificial Intelligence |
14. nov. 2020 |
|
Beskyttelse mot sidekanalsangrep i implementering av kryptoalgoritmer |
10. aug. 2020 |
|
Analyse av Secure Multi-party Computation (MPC) |
10. aug. 2020 |
|
Analyse av lettvektsalgoritmer for postkvantekrypto |
10. aug. 2020 |
|
The usability of NIST post-quantum competition candidates as replacements in existing systems and protocols |
30. sep. 2019 |
|
Intermediate solutions for quantum resistant key exchange |
30. sep. 2019 |
|
Machine-Readable Security Playbooks and Orchestration |
20. aug. 2019 |
|