Articles dans des revues avec comité de lecture (69)

  1. 22. Lerman, L., Veshchikov, N., Markowitch, O., & Standaert, F.-X. (2017). Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling. I.E.E.E. transactions on computers, 1-16. doi:10.1109/TC.2017.2731342
  2. 23. Cao, Z., Liu, L., & Markowitch, O. (2017). Comment on Highly Efficient Linear Regression Outsourcing to a Cloud. IEEE transactions on cloud computing,(99).
  3. 24. Lerman, L., Markowitch, O., Poussier, R., & Standaert, F.-X. (2017). Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis (extended version). Journal of Cryptographic Engineering, 1-13.
  4. 25. Sisiaridis, D., Kuchta, V., & Markowitch, O. (2017). A categorical approach in handling event-ordering in distributed systems. Proceedings - International Conference on Parallel and Distributed Systems,, 7823865 1145-1150. doi:10.1109/ICPADS.2016.0150
  5. 26. Cao, Z., Liu, L., & Markowitch, O. (2017). Analysis of one scheme for enabling cloud storage auditing with verifiable outsourcing of key updates. International journal of network security, 19(6), 950-954. doi:10.6633/IJNS.201711.19(6).11
  6. 27. Kuchta, V., Sharma, G., Sahu, R. A., Bhatia, T. M., & Markowitch, O. (2017). Secure certificateless proxy re-encryption without pairing. Lecture notes in computer science, 10418 LNCS, 85-101. doi:10.1007/978-3-319-64200-0_6
  7. 28. Lerman, L., Veshchikov, N., Picek, S., & Markowitch, O. (2017). On the Construction of Side-Channel Attack Resilient S-boxes. Lecture notes in computer science, 10348 LNCS, 102-119. doi:10.1007/978-3-319-64647-3_7
  8. 29. Fernandes Medeiros, S., Gerard, F., Veshchikov, N., Lerman, L., & Markowitch, O. (2016). Breaking Kalyna 128/128 with Power Attacks. Lecture notes in computer science, 10076, 402-414. doi:10.1007/978-3-319-49445-6_23
  9. 30. Kuchta, V., & Markowitch, O. (2016). Multi-Authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices. Lecture notes in computer science, 10311, 1-23. doi:10.1007/978-3-319-61273-7_20
  10. 31. Liu, L., Cao, Z., & Markowitch, O. (2016). A Note on Design Flaws in One Aggregated-Proof Based Hierarchical Authentication Scheme for The Internet of Things. International journal of electronics and information engineering, 5(2), 88-92.
  11. 32. Kuchta, V., & Markowitch, O. (2016). Identity-based threshold encryption on lattices with application to searchable encryption. Communications in computer and information science, 651, 117-129. doi:10.1007/978-981-10-2741-3_10
  12. 33. Lerman, L., Martinasek, Z., & Markowitch, O. (2016). Robust profiled attacks: should the adversary trust the dataset? I E T Information Security, 11(4), 188-194. doi:10.1049/iet-ifs.2015.0574

  13. << Précédent 1 2 3 4 5 6 7 8 9 10 11 12 Suivant >>