Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:FPS (14. : 2021 : Paris) Foundations and practice of security
1. Verfasser: Yi, Yunjie (VerfasserIn)
Weitere Verfasser: Mandal, Kalikinkar (VerfasserIn), Gong, Guang (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Secure and Robust Cyber Security Threat Information Sharing 2022 Bkakria, Anis
EXMULF: An Explainable Multimodal Content-Based Fake News Detection System 2022 Amri, Sabrine
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts 2022 Naghmouchi, Montassar
Lightweight Authentication and Encryption for Online Monitoring in IIoT Environments 2022 Garcia, Armando Miguel
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3 2022 Lounis, Karim
A Tight Integration of Symbolic Execution and Fuzzing (Short Paper) 2022 Vinçont, Yaelle
Generic Construction for Identity-Based Proxy Blind Signature 2022 Bultel, Xavier
Optimizing Anonymity and Performance in a Mix Network 2022 Jee, Mathieu
Breaking Black Box Crypto-Devices Using Laser Fault Injection 2022 Selmke, Bodo
Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission 2022 Yi, Yunjie
Creation and Detection of German Voice Deepfakes 2022 Barnekow, Vanessa
Asset Sensitivity for Aligning Risk Assessment Across Multiple Units in Complex Organizations 2022 Mascia, Carla
An Extensive Comparison of Systems for Entity Extraction from Log Files 2022 Chhabra, Anubhav
Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era 2022 Bendoukha, Adda-Akram
HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPM 2022 Paulin, Dylan
Automatic Annotation of Confidential Data in Java Code 2022 Bastys, Julia
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain 2022 Ankergård, Sigurd Frej Joel Jørgensen
Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator 2022 Heine, Felix
Why Anomaly-Based Intrusion Detection Systems Have Not Yet Conquered the Industrial Market? 2022 Seng, S.
At the Bottom of Binary Analysis: Instructions 2022 Bonfante, Guillaume
Alle Artikel auflisten