Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Chmielewski, L.M."'
Publikováno v:
Batina, L. (ed.), Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings, 118-137. Cham : Springer Nature Switzerland
STARTPAGE=118;ENDPAGE=137;ISSN=0302-9743;TITLE=Batina, L. (ed.), Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings
STARTPAGE=118;ENDPAGE=137;ISSN=0302-9743;TITLE=Batina, L. (ed.), Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings
Autor:
Krček, M., Li, H., Paguada, S., Rioja, U., Wu, L., Perin, G., Chmielewski, L.M., Batina, L., Bäck, T., Buhan, I., Picek, S.
Publikováno v:
Batina, L.; Bäck, T.; Buhan, I. (ed.), Security and Artificial Intelligence: A Crossdisciplinary Approach, 48-71. Cham : Springer International Publishing
STARTPAGE=48;ENDPAGE=71;TITLE=Batina, L.; Bäck, T.; Buhan, I. (ed.), Security and Artificial Intelligence: A Crossdisciplinary Approach
STARTPAGE=48;ENDPAGE=71;TITLE=Batina, L.; Bäck, T.; Buhan, I. (ed.), Security and Artificial Intelligence: A Crossdisciplinary Approach
This chapter provides an overview of recent applications of deep learning to profiled side-channel analysis (SCA). The advent of deep neural networks (mainly multiple layer perceptrons and convolutional neural networks) as a learning algorithm for pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5ea18f1a7e3673a6789a89eb34fa354e
https://hdl.handle.net/2066/250781
https://hdl.handle.net/2066/250781
Publikováno v:
Zhou, J.; Adepu, S.; Alcaraz, C. (ed.), Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings, pp. 165-182
Item does not contain fulltext ACNS 2022
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1236::de47e7995bf73007e0469579de813ae2
https://repository.ubn.ru.nl/handle/2066/282745
https://repository.ubn.ru.nl/handle/2066/282745
Autor:
Batina, L., Buhan, I.R., Chmielewski, L.M., Gunnarsdottir, E., Jahandideh, V., Stock, T., Weissbart, L.J.A.
Contains fulltext : 253567.pdf (Publisher’s version ) (Open Access) 23 p.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::6824940a6ef58fc100b06e4c37081208
https://hdl.handle.net/2066/253567
https://hdl.handle.net/2066/253567
Autor:
Chmielewski, L.M., Weissbart, L.J.A.
Publikováno v:
Zhou, J. (ed.), Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings, pp. 96-113
Item does not contain fulltext ACNS 2021
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1236::10a5bae36ea07ca7cfba47e178082d6d
https://repository.ubn.ru.nl/handle/2066/238053
https://repository.ubn.ru.nl/handle/2066/238053
Publikováno v:
Kim, Y. (ed.), CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event Republic of Korea November 15-19, 2021, 685-699. New York : ACM
STARTPAGE=685;ENDPAGE=699;TITLE=Kim, Y. (ed.), CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event Republic of Korea November 15-19, 2021
STARTPAGE=685;ENDPAGE=699;TITLE=Kim, Y. (ed.), CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event Republic of Korea November 15-19, 2021
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::885fee030a2dc2b61ac5b15c76a6eedc
http://hdl.handle.net/2066/246744
http://hdl.handle.net/2066/246744
Autor:
Chmielewski, L.M.
Contains fulltext : 207470.pdf (Publisher’s version ) (Open Access) Radboud University, 23 augustus 2019 Promotor : Batina, L. xii, 191 p.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3b58bfc1e02e65cada95774dbb8bfc91
https://hdl.handle.net/2066/207470
https://hdl.handle.net/2066/207470
Publikováno v:
Meersman, R. (ed.), On the Move to Meaningful Internet Systems: OTM 2009. Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, 861-878. Berlin : Springer
STARTPAGE=861;ENDPAGE=878;ISSN=0302-9743;TITLE=Meersman, R. (ed.), On the Move to Meaningful Internet Systems: OTM 2009. Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II
On the Move to Meaningful Internet Systems, OTM 2009, 861-878
Meersman, R. (ed.), On the Move to Meaningful Internet Systems: OTM 2009. Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, pp. 861-878
Arxiv preprint arXiv:0906.4668
STARTPAGE=861;ENDPAGE=878;ISSN=0302-9743;TITLE=Meersman, R. (ed.), On the Move to Meaningful Internet Systems: OTM 2009. Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II
On the Move to Meaningful Internet Systems, OTM 2009, 861-878
Meersman, R. (ed.), On the Move to Meaningful Internet Systems: OTM 2009. Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, pp. 861-878
Arxiv preprint arXiv:0906.4668
Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::73601db3dceb6191fa487dda97e3875e
http://hdl.handle.net/2066/75311
http://hdl.handle.net/2066/75311
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.