Towards language support for model-based security policy engineering
|
2020 |
Amthor, Peter |
Industry 4.0: Challenges from a Data Science Perspective
|
2020 |
Abraham, Ajith |
Enterprise Systems Architecture - Essentials
|
2020 |
Proper, Henderik A. |
DCBC: A Distributed High-performance Block-Cipher Mode of Operation
|
2020 |
Trabelsi, Oussama |
Ensuring the Integrity of Outsourced Web Scripts
|
2020 |
Mignerey, Josselin |
FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints
|
2020 |
Liu, Chih-Chun |
Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing Modes
|
2020 |
Korniotakis, John |
Optimizing dm-crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-processors
|
2020 |
Demir, Levent |
SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor Networks
|
2020 |
Spasić, Bojan |
This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining
|
2020 |
Marsalek, Alexander |
ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications
|
2020 |
Bozdemir, Beyza |
Software Emulation of Quantum Resistant Trusted Platform Modules
|
2020 |
Fiolhais, Luis |
Deconstructing the Decentralization Trilemma
|
2020 |
Halpin, Harry |
Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption
|
2020 |
Bakshi, Puneet |
Under Pressure: Pushing Down on Me — Touch Sensitive Door Handle to Identify Users at Room Entry
|
2020 |
Tietz, Christian |
Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment
|
2020 |
Aouad, Lamine |
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks
|
2020 |
Belguith, Sana |
Analysing Digital Footprints to Infer the Health of Populations and Individuals
|
2020 |
Cox, Ingemar Johansson |
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems
|
2020 |
Borcherding, Anne |
cipherPath: Efficient Traversals over Homomorphically Encrypted Paths
|
2020 |
Bramm, Georg |