Search

Your search keyword '"Halunen, K. (Kimmo)"' showing total 11 results

Search Constraints

Start Over You searched for: Author "Halunen, K. (Kimmo)" Remove constraint Author: "Halunen, K. (Kimmo)"
11 results on '"Halunen, K. (Kimmo)"'

Search Results

1. Vulnerabilities in IoT devices, backends, applications, and components

2. Implementing post-quantum cryptography for developers

3. Digi-HTA, assessment framework for digital healthcare services:information security and data protection in health technology – initial experiences

4. Models-based analysis of both user and attacker tasks:application to EEVEHAC

5. Applying a cryptographic metric to post-quantum lattice-based signature algorithms

6. Common cybersecurity requirements in IoT standards, best practices, and guidelines

7. Quantum-safe signing of notification messages in intelligent transport systems

8. Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC

9. CryptoVault:a secure hardware wallet for decentralized key management

10. Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions

11. Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions

Catalog

Books, media, physical & digital resources