Author of the publication

Taxonomy Model for Cyber Threat Intelligence Information Exchange Technologies.

, , , and . WISCS@CCS, page 51-60. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BAFi: a practical cryptographic secure audit logging scheme for digital forensics., and . Secur. Commun. Networks, 8 (17): 3180-3190 (2015)LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards., and . IACR Cryptology ePrint Archive, (2017)Incident Object Description Exchange Format Usage Guidance., and . RFC, (November 2017)Use of the SHAKE One-Way Hash Functions in the Cryptographic Message Syntax (CMS)., and . RFC, (January 2020)PQ-HPKE: Post-Quantum Hybrid Public Key Encryption., , and . IACR Cryptol. ePrint Arch., (2022)Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security., , , and . RFC, (June 2020)The Viability of Post-quantum X.509 Certificates., , , and . IACR Cryptology ePrint Archive, (2018)Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments., and . IACR Cryptol. ePrint Arch., (2023)Post-quantum Hash-Based Signatures for Secure Boot., , , and . SVCC, volume 1383 of Communications in Computer and Information Science, page 71-86. Springer, (2020)Two PQ Signature Use-cases: Non-issues, challenges and potential solutions., and . IACR Cryptology ePrint Archive, (2019)