Author:
Rashidi Leila,Kostecki Daniel,James Alexander,Peterson Anthony,Ghaderi Majid,Jero Samuel,Nita-Rotaru Cristina,Okhravi Hamed,Safavi-Naini Reihaneh
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges;Post-Quantum Cryptography;2023
2. On Randomization in MTD Systems;Proceedings of the 9th ACM Workshop on Moving Target Defense;2022-11-07
3. Dynamic Security with SDN: Opportunities, Challenges, and Lessons Learned;Proceedings of the 9th ACM Workshop on Moving Target Defense;2022-11-07
4. Securing Communication Against Leaky Switches;2022 IEEE Conference on Communications and Network Security (CNS);2022-10-03
5. Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV;Security, Privacy, and Applied Cryptography Engineering;2022