Personensuche
X
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
2
Pushing AES-256-GCM to Limits: Design, Implementation and R..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
5
On Deploying Quantum-Resistant Cybersecurity in Intelligent..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
6
On Efficiency and Usability of Group Signatures on Smartpho..:
, In:
?
Proceedings of the 16th International Conference on Availability, Reliability and Security ,
7