Hell, Martin
295  results:
Search for persons X
?
 
?
3

Grain-128AEADv2: Strengthening the Initialization Against K..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
 
?
5

Flowrider: Fast On-Demand Key Provisioning for Cloud Networ..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks,
 
?
6

Communicating Cybersecurity Vulnerability Information: A Pr..:

, In: Product-Focused Software Process Improvement; Lecture Notes in Computer Science,
Hell, Martin ; Höst, Martin - p. 215-230 , 2021
 
?
7

Electromagnetic Side-Channel Attack on AES using Low-end Eq..:

Hell, Martin ; Westman, Oskar
ECTI Transactions on Computer and Information Technology (ECTI-CIT).  14 (2020)  2 - p. 139-148 , 2020
 
?
8

Energy consumption for securing lightweight IoT protocols:

, In: Proceedings of the 10th International Conference on the Internet of Things,
 
?
9

A Recommender System for User-Specific Vulnerability Scorin:

, In: Lecture Notes in Computer Science; Risks and Security of Internet and Systems,
 
?
11

On the Suitability of Using SGX for Secure Key Storage in t..:

, In: Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science,
 
?
12

Automated CPE Labeling of CVE Summaries with Machine Learni..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
Wåreus, Emil ; Hell, Martin - p. 3-22 , 2020
 
?
13

Evaluation of the HAVOSS software process maturity model:

, In: 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA),
Host, Martin ; Hell, Martin - p. 137-140 , 2020
 
?
14

Software-Defined Networking for Emergency Traffic Managemen..:

, In: Advances in Intelligent Systems and Computing; Vehicular Ad-hoc Networks for Smart Cities,
 
?
 
1-15