Encrypted Cloud-Based Set-Theoretic Model Predictive Control | 0 | 0.34 | 2022 |
Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis | 0 | 0.34 | 2022 |
Covert Channels in Cyber-Physical Systems | 1 | 0.35 | 2021 |
Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications | 0 | 0.34 | 2021 |
Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks | 5 | 0.40 | 2020 |
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. | 0 | 0.34 | 2020 |
NOMA-Assisted Machine-Type Communications in UDN: State-of-the-Art and Challenges | 10 | 0.46 | 2020 |
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management<sup>1</sup> | 1 | 0.39 | 2019 |
Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN | 0 | 0.34 | 2019 |
Fault Analysis of the New Ukrainian Hash Function Standard - Kupyna. | 0 | 0.34 | 2018 |
Impossible Differential Cryptanalysis Of Reduced-Round Skinny | 3 | 0.39 | 2017 |
Physical Layer Security in Ultra-Dense Networks. | 4 | 0.44 | 2017 |
Average Downlink Rate In Ultra-Dense Networks | 0 | 0.34 | 2017 |
Improved Multiple Impossible Differential Cryptanalysis Of Midori128 | 0 | 0.34 | 2017 |
Security, Privacy, and Safety Aspects of Civilian Drones: A Survey. | 30 | 1.18 | 2017 |
Fault analysis on Kalyna | 1 | 0.35 | 2017 |
Lelantos: A Blockchain-Based Anonymous Physical Delivery System | 0 | 0.34 | 2017 |
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. | 5 | 0.42 | 2017 |
Performance Analysis of Multiple Association in Ultra-Dense Networks. | 9 | 0.56 | 2017 |
Impossible Differential Attack On Reduced Round Sparx-64/128 | 2 | 0.40 | 2017 |
Detection techniques for data-level spoofing in GPS-based phasor measurement units | 1 | 0.35 | 2016 |
A Meet In The Middle Attack On Reduced Round Kiasu-Bc | 1 | 0.49 | 2016 |
Generalized MitM attacks on full TWINE. | 2 | 0.37 | 2016 |
Truncated And Multiple Differential Cryptanalysis Of Reduced Round Midori128 | 0 | 0.34 | 2016 |
An empirical study on supply chain practices and their effect on financial performance: a case from Egypt. | 0 | 0.34 | 2016 |
Improved Linear Cryptanalysis Of Round-Reduced Aria | 0 | 0.34 | 2016 |
Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting. | 2 | 0.38 | 2015 |
Meet-in-the-Middle Attacks on Round-Reduced Khudra. | 5 | 0.42 | 2015 |
Meet-in-the-Middle Attacks on Reduced Round Piccolo. | 0 | 0.34 | 2015 |
Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers | 1 | 0.36 | 2014 |
Characterization of Covert Channels in DNS. | 3 | 0.40 | 2014 |
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images. | 0 | 0.34 | 2013 |
A Markov Decision Process Model for High Interaction Honeypots | 4 | 0.46 | 2013 |
Second order collision for the 42-step reduced DHA-256 hash function | 1 | 0.35 | 2013 |
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks. | 7 | 0.50 | 2013 |
Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings | 26 | 1.03 | 2013 |
Dempster-Shafer Evidence Combining for Anti-Honeypot Technologies | 3 | 0.41 | 2012 |
Cryptanalysis of the Loiss Stream Cipher. | 2 | 0.40 | 2012 |
Comments on the security of Chen's authenticated encryption scheme | 1 | 0.38 | 2011 |
Cryptanalysis Of A Public Key Encryption Scheme Using Ergodic Matrices | 1 | 0.37 | 2011 |
Fault Analysis Of The Ntruencrypt Cryptosystem | 6 | 0.53 | 2011 |
A framework to strengthen password authentication using mobile devices and browser extensions | 0 | 0.34 | 2010 |
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat | 11 | 0.76 | 2010 |
Em Channel Estimation And Data Detection For Mimo-Cdma Systems Over Slow-Fading Channels | 0 | 0.34 | 2010 |
EM-Based Joint Channel Estimation and Data Detection for MIMO-CDMA Systems | 12 | 0.56 | 2010 |
IDENTIFICATION OF MYOCARDIAL INFARCTION USING THREE-DIMENSIONAL STRAIN TENSOR FRACTIONAL ANISOTROPY. | 1 | 0.41 | 2010 |
Cryptanalysis Of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes | 2 | 0.45 | 2010 |
Joint Iterative Channel Estimation and Data Detection for MIMO-CDMA Systems over Frequency-Selective Fading Channels | 0 | 0.34 | 2010 |
On the security of image encryption schemes based on Multiple Parameters Transforms | 3 | 0.40 | 2010 |
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images | 14 | 0.86 | 2010 |