Amariucai, George T.
42  Ergebnisse:
Personensuche X
?
2

Variations and Extensions of Information Leakage Metrics wi..:

, In: 2023 IEEE 36th Computer Security Foundations Symposium (CSF),
 
?
3

ZeroProKeS: A Secure Zeroconf Key Establishment Protocol fo..:

Sakib, Shahnewaz Karim ; Amariucai, George T ; Guan, Yong
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  5 - p. 3636-3652 , 2023
 
?
 
?
5

Neural Fuzzy Extractors: A Secure Way to Use Artificial Neu..:

Jana, Abhishek ; Paudel, Bipin ; Sarker, Md Kamruzzaman...
Proceedings on Privacy Enhancing Technologies.  2022 (2022)  4 - p. 86-104 , 2022
 
?
6

Information Leakage Metrics for Adversaries with Incomplete..:

, In: ICC 2021 - IEEE International Conference on Communications,
 
?
8

Toward Home Area Network Hygiene: Device Classification and..:

, In: Advances in Security, Networks, and Internet of Things; Transactions on Computational Science and Computational Intelligence,
 
?
9

RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using..:

, In: 2020 IEEE Conference on Communications and Network Security (CNS),
Fu, Shen ; Qin, Dong ; Qiao, Daji. - p. 1-9 , 2020
 
?
10

Cybersecurity Analytics using Smart Inverters in Power Dist..:

, In: 2019 IEEE International Symposium on Technologies for Homeland Security (HST),
 
?
11

An Algebraic Quality-Time-Advantage-Based Key Establishment..:

, In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks,
 
?
12

Topological and Algebraic Properties for Classifying Unroot..:

, In: 2015 IEEE Global Communications Conference (GLOBECOM),
 
?
13

Gaussian Jamming in Block-Fading Channels under Long Term P..:

, In: 2007 IEEE International Symposium on Information Theory,
 
?
14

Minimax and Maxmin Solutions to Gaussian Jamming in Block-F..:

, In: 2007 41st Annual Conference on Information Sciences and Systems,
 
1-15