Research
Intro
Focus areas
Projects
Publications
Education
Culture
Events
People
Block-diagonal and LT codes for distributed computing with straggling servers
LDPC Codes Over the BEC: Bounds and Decoding Algorithms
Building trust in e-government services
Cryptanalysis of a robust key agreement based on public key authentication
Vendor malware: detection limits and mitigation
Security analysis of the IEEE 802.15.6 standard
Secure repairable fountain codes
Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy
Influence of addition modulo 2n on algebraic attacks
Diversity Reduces the Impact of Malware
Previous
1
…
3
4
5
6
7
Next
keyboard_arrow_up
Menu