Search for persons
X
?
2023 IEEE International Conference on Omni-layer Intelligent Systems (COINS) ,
3
Use Case Examples of Ethereum Non-Fungible Tokens Tied to A..:
, In:
?
Attacks and Defenses for the Internet-of-Things; Lecture Notes in Computer Science ,
6
Post-quantum Secure Communication with IoT Devices Using Ky..:
, In:
?
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking ,
7
A facial authentication system using post-quantum-secure da..:
, In:
?
The Fifth International Conference on Safety and Security with IoT; EAI/Springer Innovations in Communication and Computing ,
8
A Quantum-Resistant and Fast Secure Boot for IoT Devices Us..:
, In:
?
2022 International Conference of the Biometrics Special Interest Group (BIOSIG) ,
10
A Quantum-Resistant Face Template Protection Scheme using K..:
, In:
?
2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) ,
12
Rule Simplification Method Based on Covering Indexes for Fu..:
, In:
?
European Interdisciplinary Cybersecurity Conference ,
14
Sealed Storage for Low-Cost IoT Devices: an Approach Using ..:
, In:
?
2020 European Conference on Circuit Theory and Design (ECCTD) ,
15