1. 2020
  2. Published

    Clust-IT: Clustering-Based Intrusion Detection in IoT Environments

    Markiewicz, R. & Sgandurra, D., Aug 2020, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  3. Published

    Pancake: Frequency Smoothing for Encrypted Data Stores

    Grubbs, P., Khandelwal, A., Lacharite, M-S., Brown, L., Li, L., Agarwal, R. & Ristenpart, T., Aug 2020, 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, p. 2451-2468 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., 30 Jul 2020, IEEE Symposium on Security and Privacy (IEEE S&P). IEEE, p. 1332-1349 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    (De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking

    Moeckel, C., 28 Jul 2020, In: Journal of Universal Computer Science. 26, 7, p. 783-804 22 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Key assignment schemes with authenticated encryption, revisited

    Pijnenburg, J. & Poettering, B., 24 Jul 2020, In: IACR Transactions on Symmetric Cryptology. 2020, 2, p. 40-67 28 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Driverless Vehicle Security for Military Applications

    Bates, N. & Akram, R. N., 10 Jul 2020, In: Computer Weekly.

    Research output: Contribution to journalArticle

  8. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., 6 Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol

    Basso, A., Kutas, P., Merz, S. P., Petit, C. & Weitkämper, C., 5 Jul 2020, (E-pub ahead of print) p. 195-213. 19 p.

    Research output: Contribution to conferencePaperpeer-review

  10. Published

    Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., Jun 2020, In: ACM Transactions on Privacy and Security. 23, 3, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

Previous 1...6 7 8 9 10 11 12 13 ...213 Next