Trial Lecture: Coding for Flash Memories: State-of-the-art and Challenges

08.05.2024
, 10:00 am

Trial Lecture: Secure Randomness Generation

29.04.2024
, 2:00 pm

Vendor malware: detection limits and mitigation

  • O. Lysne, K.J. HoleC.W. OtterstadØ. Ytrehus, R. Aarseth, and J. Tellnes, “Vendor malware: detection limits and mitigation” IEEE Computer, vol. 49, no. 8, 2016, p. 62–69
keyboard_arrow_up