Search for persons
X
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
1
Automated Generation of Masked Nonlinear Components:: From ..:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
2
The Encryption Debate: An Enduring Struggle:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
3
Arithmetic Circuit Implementations of S-boxes for SKINNY an..:
, In:
?
2024 IEEE Vehicular Networking Conference (VNC) ,
5
Toward Viable Security Solution for VRUs in V2X Communicati..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
6
Skye: An Expanding PRF based Fast KDF and its Applications:
, In:
?
2024 IEEE Vehicular Networking Conference (VNC) ,
7
Security-Focused Training Model of Reinforcement Learning i..:
, In:
?
2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring) ,
8
Post-Quantum Impacts on V2X Certificates – Already at The E..:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
9
Threshold Structure-Preserving Signatures:
, In:
?
2023 IEEE Security and Privacy Workshops (SPW) ,
10
On the Brittleness of Robust Features: An Exploratory Analy..:
, In:
?
2023 IEEE Vehicular Networking Conference (VNC) ,
11
A New Approach To Pseudonym Certificate Management in V2X C..:
, In:
?
2023 IEEE Conference on Standards for Communications and Networking (CSCN) ,
13
Open Questions in VRU Standards from Security and Privacy P..:
, In:
?
Proceedings of the 20th ACM International Conference on Computing Frontiers ,
14
Yes we CAN! : Towards bringing security to legacy-restri..:
, In:
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
15