Filter your results
- 4
- 1
- 5
- 5
- 1
- 1
- 1
- 1
- 1
- 5
- 1
- 5
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection8th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2014, Arlington, United States. pp.245-261, ⟨10.1007/978-3-662-45355-1_16⟩
Conference papers
hal-01386769v1
|
||
|
Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.81-90, ⟨10.1007/978-3-030-04537-1_5⟩
Conference papers
hal-02076301v1
|
||
Multi-channel Security Through Data Fragmentation14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.137-155, ⟨10.1007/978-3-030-62840-6_7⟩
Conference papers
hal-03794644v1
|
|||
|
Vulnerability Assessment of InfiniBand Networking13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.179-205, ⟨10.1007/978-3-030-34647-8_10⟩
Conference papers
hal-03364575v1
|
||
|
An FPGA System for Detecting Malicious DNS Network Traffic7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.195-207, ⟨10.1007/978-3-642-24212-0_15⟩
Conference papers
hal-01569565v1
|