- O. Lysne, K.J. Hole, C.W. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes, “Vendor malware: detection limits and mitigation” IEEE Computer, vol. 49, no. 8, 2016, p. 62–69
Friday seminar: Key Exchange for Unmanned Systems Multidomain Interoperability
20.05.2022
, 1:00 pm
Friday seminar: An Investigation of Post-Quantum Hybrids
13.05.2022
, 1:00 pm