Author of the publication

An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model.

, , , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 166-179. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions., , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 144-157. Springer, (2012)Data-Driven Constraint Mining for Realizable Adversarial Samples., , , , , and . MILCOM, page 7-12. IEEE, (2023)Adaptive Cyber Defenses for Botnet Detection and Mitigation., , , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)VulnerVAN: A Vulnerable Network Generation Tool., , , , , , , , , and 2 other author(s). MILCOM, page 1-6. IEEE, (2019)On Detecting Manifestation of Adversary Characteristics., , , , , , , , and . MILCOM, page 431-437. IEEE, (2018)Harnessing the Power of Deception in Attack Graph-Based Security Games., , , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 147-167. Springer, (2020)On Defensive Cyber Deception: A Case Study Using SDN., , , , , , , and . MILCOM, page 110-115. IEEE, (2018)Moving Target Defense Quantification., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception., , , , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 21-32. Springer, (2019)An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model., , , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 166-179. Springer, (2012)