gverticale / network-security-and-cryptography
Notebooks and Exercises for Network Security and Cryptography
☆13Updated 9 months ago
Alternatives and similar repositories for network-security-and-cryptography:
Users that are interested in network-security-and-cryptography are comparing it to the libraries listed below
- VM for the SDN class at Polimi☆19Updated 9 months ago
- GitHub Desktop tutorial repository☆10Updated last year
- ☆14Updated 10 months ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆12Updated 3 years ago
- Loss Learning Predictor for regression problems☆8Updated 3 years ago
- Intel Paillier Cryptosystem Library is an open-source library which provides accelerated performance of a partial homomorphic encryption …☆56Updated 6 months ago
- Various DDOS attacks in ONOS data plane and on ONOS control plane.DDOS attack detection and prevention using deep learning☆11Updated 6 years ago
- This is a dataset of 5G network traffic for use with machine learning tools to benchmark attack detection capabilities for multiple diffe…☆57Updated 2 months ago
- High Performance Implementation of Secure Multiparty Computation protocols☆13Updated 2 months ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆30Updated last year
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- A set of exercises for getting started with the Tamarin prover☆16Updated last year
- DPF and PIR based on DPF in C++☆16Updated 3 years ago
- Dataset for the paper M. Polese, L. Bonati, S. D'Oro, S. Basagni, T. Melodia, "ColO-RAN: Developing Machine Learning-based xApps for Open…☆30Updated 3 months ago
- Artifacts accompanying the NSDI '24 paper: Leo: Online ML-based Traffic Classification at Multi-Terabit Line Rate.☆13Updated 10 months ago
- Appunti di Sicurezza delle Reti a.a. 2018-2019☆9Updated 4 years ago
- A secure aggregation system for private federated learning☆38Updated 8 months ago
- Our first MPC program (aka: MP-SPDZ by a dummy)☆12Updated last year
- Yet Another Fog Simulator (YAFS)☆103Updated 4 months ago
- Using the ns-3 simulator to implement wireless nodes of blockchain and analyse its performance in terms of transaction throughput, mining…☆11Updated 4 years ago
- Using OMNeT++ from python☆61Updated 3 years ago
- For the full documentation, see https://efc-package.readthedocs.io/en/latest/☆10Updated last year
- Dynamic Traffic Prioritization in IoT networks using SDN (ONOS Controller and Mininet Topology)☆13Updated 7 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- Secure Aggregation for FL☆34Updated last year
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- ☆23Updated 2 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆26Updated last year
- Heavy-Hitter detection in P4 switch ASIC using Inter-Packet Gap☆24Updated 5 months ago
- ☆31Updated 4 years ago