Open-Source Vulnerabilities in Software Supply Chains |
30. sep. 2022 |
|
Kvalitetsvurdering av setninger som passord |
30. sep. 2022 |
|
Using cryptography insecurely: Don’t do this at home! – But why? |
21. sep. 2022 |
|
Smart contract for an investment and trading platform |
19. sep. 2022 |
|
Deteksjon av sjelden angrepstrafikk med Fourier-analyse |
8. sep. 2022 |
|
Deteksjon av gammel/utdatert programvare |
7. sep. 2022 |
|
Applied Cyber Security |
7. sep. 2022 |
|
Post-quantum kryptografi: Lattice med struktur |
22. okt. 2021 |
|
Post-quantum kryptografi: CSIDH |
22. okt. 2021 |
|
Security and Privacy of Media Capturing |
21. okt. 2021 |
|
From VLAN separation to microsegmentation and NSX in a large-scale environment |
21. okt. 2021 |
|
Visualization of Threat Intelligence |
31. aug. 2021 |
|
Developing a Tool for Annotating Threat Reports |
31. aug. 2021 |
|
Security Analysis Methods and Tools |
23. aug. 2021 |
|
Classifying Rogue Access Points with Semantic Graph Artificial Intelligence |
14. nov. 2020 |
|
Beskyttelse mot sidekanalsangrep i implementering av kryptoalgoritmer |
10. aug. 2020 |
|
Analyse av Secure Multi-party Computation (MPC) |
10. aug. 2020 |
|
Analyse av lettvektsalgoritmer for postkvantekrypto |
10. aug. 2020 |
|
The usability of NIST post-quantum competition candidates as replacements in existing systems and protocols |
30. sep. 2019 |
|
Intermediate solutions for quantum resistant key exchange |
30. sep. 2019 |
|
Machine-Readable Security Playbooks and Orchestration |
20. aug. 2019 |
|