Personensuche
X
?
Techniques and Applications for Advanced Information Privacy and Security ,
2
Defeating Active Phishing Attacks for Web-Based Transaction:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
4
Towards Discovering Quantum-Threats for Applications Using ..:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
5
Migrating Blockchains Away from ECDSA for Post-quantum Secu..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
6
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Functi..:
, In:
?
2022 IEEE Conference on Dependable and Secure Computing (DSC) ,
8
Securing Password Authentication for Web-based Applications:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
10
Calibrating Learning Parity with Noise Authentication for L..:
, In:
?
Lecture Notes in Computer Science; Information Security ,
11
Layering Quantum-Resistance into Classical Digital Signatur..:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
12
Quantum Computing Threat Modelling on a Generic CPS Setup:
, In:
?
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) ,
13