Research
Intro
Focus areas
Projects
Publications
Education
Culture
Events
People
Building trust in e-government services
Cryptanalysis of a robust key agreement based on public key authentication
Vendor malware: detection limits and mitigation
Security analysis of the IEEE 802.15.6 standard
Secure repairable fountain codes
Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy
Influence of addition modulo 2n on algebraic attacks
Diversity Reduces the Impact of Malware
Toward anti-fragility: a malware-halting technique
Cryptanalysis of two PAKE protocols for body area networks and smart environments
Previous
1
…
3
4
5
6
7
Next
keyboard_arrow_up
Menu