Aubrey Alston

According to our database1, Aubrey Alston authored at least 8 papers between 2016 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
On the Cryptanalysis via Approximation of Cryptographic Primitives Relying on the Planted Clique Conjecture.
CoRR, 2017

Attribute-based Encryption for Attribute-based Authentication, Authorization, Storage, and Transmission in Distributed Storage Systems.
CoRR, 2017

Corpus-compressed Streaming and the Spotify Problem.
CoRR, 2017

A Steganographic Design Paradigm for General Steganographic Objectives.
CoRR, 2017

Achieving Efficient and Provably Secure Steganography in Practice.
CoRR, 2017

Concolic Execution as a General Method of Determining Local Malware Signatures.
CoRR, 2017

Extending the Metasploit Framework to Implement an Evasive Attack Infrastructure.
CoRR, 2017

2016
Neutralizing interest flooding attacks in Named Data Networks using cryptographic route tokens.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016


  Loading...