Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
|
2021 |
Keller, Hannah |
Automated Symbolic Verification of Telegram’s MTProto 2.0
|
2021 |
Miculan, Marino |
Vulnerability Metrics for Graph-based Configuration Security
|
2021 |
Iganibo, Ibifubara |
Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling
|
2021 |
Leune, Kees |
Signer and Message Ambiguity from a Variety of Keys
|
2021 |
Teşeleanu, George |
A New MILP Model for Matrix Multiplications with Applications to KLEIN and PRINCE
|
2021 |
İlter, Murat |
An Extension of the Avalanche Criterion in the Context of c-Differentials
|
2021 |
Ellingsen, Pål |
Private Set Intersection: Past, Present and Future
|
2021 |
Andreea, Ionita |
An Upcycling Tokenization Method for Credit Card Numbers
|
2021 |
Nugier, Cyrius |
Can a TLS Certificate Be Phishy?
|
2021 |
Hageman, Kaspar |
Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss
|
2021 |
Thaeter, Florian |
A New Delegated Authentication Protocol based on PRE
|
2021 |
Sbai, Anass |
Multi-Party Private Set Intersection Protocols for Practical Applications
|
2021 |
Bay, Asli |
Fair Mutual Authentication
|
2021 |
Cichoń, Jacek |
Towards CRYSTALS-Kyber VHDL Implementation
|
2021 |
Ricci, Sara |
Machine Learning Classification of Obfuscation using Image Visualization
|
2021 |
Parker, Colby |
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates
|
2021 |
Sheikh, Nazim |
A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation
|
2021 |
Subba, Basant |
Mobile Family Detection through Audio Signals Classification
|
2021 |
Casolare, Rosangela |
Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities
|
2021 |
Blinowski, Grzegorz |