Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ISPEC (17. : 2022 : Taipeh) Information security practice and experience
1. Verfasser: Tasopoulos, George (VerfasserIn)
Weitere Verfasser: Li, Jinhui (VerfasserIn), Fournaris, Apostolos P. (VerfasserIn), Zhao, Raymond K. (VerfasserIn), Sakzad, Amin (VerfasserIn), Steinfeld, Ron (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Continued Fractions Applied to a Family of RSA-like Cryptosystems 2022 Cotan, Paul
Practical Backdoor Attack Against Speaker Recognition System 2022 Luo, Yuxiao
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment 2022 Han, Kyusuk
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data 2022 Ng, Zheng Yao
Designing Enhanced Robust 6G Connection Strategy with Blockchain 2022 Thomsen, August Lykke
Blockchain-Based Confidential Payment System with Controllable Regulation 2022 Liao, Yu-Chen
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System 2022 Bodi, Bodi
Optimal Generic Attack Against Basic Boneh-Boyen Signatures 2022 Fu, Yen-Kang
Physical Zero-Knowledge Proof Protocol for Topswops 2022 Komano, Yuichi
Secure Human Identification Protocol with Human-Computable Passwords 2022 Matelski, Sławomir
Techniques for Continuous Touch-Based Authentication 2022 Georgiev, Martin
Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning 2022 Quyen, Nguyen Huu
Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance 2022 Viţel, Silviu
PriApp-Install: Learning User Privacy Preferences on Mobile Apps’ Installation 2022 Son, Ha Xuan
Detect Compiler Inserted Run-time Security Checks in Binary Software 2022 Pramanick, Koyel
UCC: Universal and Committee-based Cross-chain Framework 2022 Zhang, Yi
Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance 2022 Lee, Yi-Hsiu
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios 2022 Zhao, Yang
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption 2022 Yuan, Jiaming
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities 2022 Perera, Maharage Nisansala Sevwandi
Alle Artikel auflisten