Search

Your search keyword '"Maniatakos, Mihalis"' showing total 32 results

Search Constraints

Start Over You searched for: Author "Maniatakos, Mihalis" Remove constraint Author: "Maniatakos, Mihalis"
32 results on '"Maniatakos, Mihalis"'

Search Results

1. Applied Cryptography and Network Security Workshops

2. On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis

3. Robust co-synthesis of embedded control systems with occasional deadline misses

4. Quantum Computing Threat Modelling on a Generic CPS Setup

5. Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment

6. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack

7. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass

8. Towards Demystifying Adversarial Robustness of Binarized Neural Networks

9. POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools

10. POSTER: Another Look at Boyar-Peralta’s Algorithm

11. Kryptonite: An Adversarial Attack Using Regional Focus

12. POSTER: LHSA: Lightweight Hardware Security Arbitrator

13. PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor

14. Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures

15. An Efficient Proactive Secret Sharing Scheme for Cloud Storage

16. Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography

17. Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain

18. WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps

19. A (Bit)slice of Rainbow

20. Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security

21. Attacklets to Test Anomaly Detectors for Critical Infrastructure

22. BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud?

23. Memory Deduplication as a Protective Factor in Virtualized Systems

24. Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart Grid

25. Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA

26. On Reverse Engineering Neural Network Implementation on GPU

27. A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning

28. Shaping Blockchain Technology for Securing Supply Chains

29. Proof of Assets in the Diem Blockchain

30. An Identity-Based Blind Signature Scheme with Message Recovery from Pairings

31. Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments

32. The Obfuscation Method of User Identification System

Catalog

Books, media, physical & digital resources