Janovsky, Adam
19  Ergebnisse:
Personensuche X
?
2

Explaining the Use of Cryptographic API in Android Malware:

, In: E-Business and Telecommunications; Communications in Computer and Information Science,
 
?
3

Biased RSA Private Keys: Origin Attribution of GCD-Factorab..:

, In: Computer Security – ESORICS 2020; Lecture Notes in Computer Science,
Janovsky, Adam ; Nemec, Matus ; Svenda, Petr.. - p. 505-524 , 2020
 
?
4

Bringing Kleptography to Real-World TLS:

, In: Information Security Theory and Practice; Lecture Notes in Computer Science,
 
?
9

Bringing Kleptography to Real-World TLS:

Janovsky, Adam ; Krhovjak, Jan ; Matyas, Vashek
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-030-20074-9_3.  , 2018
 
?
12

A Practical Approach to Cleaning Molds from Rubber Residues:

, In: 2022 26th International Conference on Circuits, Systems, Communications and Computers (CSCC),
Novak, Martin ; Skrobak, Adam ; Hausnerova, Berenika... - p. 316-321 , 2022
 
?
 
1-15
Mehr Literatur finden