Networks and Security
1 – 239 of 239
- show: 250
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2024
-
Mark
Non-Fungible Tokens as a Framework for Sustainable Innovation in Pharmaceutical R&D: A Smart Contract-Based Platform for Data Sharing and Rightsholder Protection
(
- Contribution to journal › Article
-
Mark
Impact of Positioning Uncertainty on Autonomous Intersection Management System
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
CCA Security with Short AEAD Tags
(
- Contribution to journal › Article
-
Mark
Interpretable machine learning for predicting the fate and transport of pentachlorophenol in groundwater
(
- Contribution to journal › Article
-
Mark
On Decentralized Cloud Storage Security and an Efficient Post-Quantum Encryption Scheme
2024)(
- Thesis › Licentiate thesis
-
Mark
Context Committing Security of Leveled Leakage-Resilient AEAD
(
- Contribution to journal › Article
-
Mark
Cybersecurity Education in Universities : A Comprehensive Guide to Curriculum Development
(
- Contribution to journal › Article
-
Mark
Tight Security of TNT and Beyond : Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
2024) 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14651 LNCS. p.249-279(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Scalable Intelligent Traffic Balancing: Advancing Efficiency, Safety, and Sustainability in Urban Transportation Through Machine Learning and AIM Integration
2024) 2023 IEEE Global Conference on Artificial Intelligence and Internet of Things, GCAIoT(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO †
(
- Contribution to journal › Article
-
Mark
Resilient Cloud Control System: Dynamic Frequency Adaptation via Q-learning
2024) 27th Conference on Innovation in Clouds, Internet and Networks, ICIN(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
VNN: Verification-Friendly Neural Networks with Hard Robustness Guarantees
2024) 41st International Conference on Machine Learning, ICML 2024 In Proceedings of Machine Learning Research 235. p.2846-2856(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast Parallelizable Misuse-Resistant Authenticated Encryption : Low Latency (Decryption-Fast) SIV
2024) Selected Areas in Cryptography 2024(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further improvements of the estimation of key enumeration with applications to solving LWE
2024) In Cryptography and Communications(
- Contribution to journal › Article
-
Mark
A New Sieving-style Information-set Decoding Algorithm
(
- Contribution to journal › Article
-
Mark
A Key-Recovery Attack on the LCMQ Authentication Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2023
-
Mark
Lightweight Machine Learning for Seizure Detection on Wearable Devices
2023) IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2023)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Attack Resilient Cloud-Based Control Systems for Industry 4.0
(
- Contribution to journal › Article
-
Mark
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
2023)(
- Working paper/Preprint › Preprint in preprint archive
-
Mark
A Safe and Robust Autonomous Intersection Management System Using a Hierarchical Control Strategy and V2I Communication
(
- Contribution to journal › Article
-
Mark
Efficient Security Protocols for Constrained Devices
2023) In EIT series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
Decryption Failure Attacks on Post-Quantum Cryptography
2023) In Series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
Find the Bad Apples: An efficient method for perfectkey recovery under imperfect SCA oracles– A case study of Kyber
(
- Contribution to journal › Article
-
Mark
PrSLoc : Sybil attack detection for localization with private observers using differential privacy
(
- Contribution to journal › Article
-
Mark
A side-channel attack on a masked and shuffled software implementation of Saber
(
- Contribution to journal › Article
-
Mark
Post-Quantum Cryptography : 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings
(2023) The 14th International Conference on Post-Quantum Cryptography In Lecture Notes in Computer Science 14154.
- Book/Report › Conference proceeding (editor)
-
Mark
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Estimation of Key Enumeration with Applications to Solving LWE
2023) 2023 International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Do Not Bound to a Single Position: Near-Optimal Multi-Positional Mismatch Attacks Against Kyber and Saber
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
(
- Contribution to journal › Article
-
Mark
Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Performance Evaluation of QUIC vs TCP for Cloud Control Systems
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud: Achieving Punctuality for Time-Critical Cloud Control Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins
2023) 31st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cache-Timing Attack Against HQC
(
- Contribution to journal › Article
-
Mark
Access Security Policy Generation for Containers as a Cloud Service
(
- Contribution to journal › Article
-
Mark
Scheduling for Industrial Control Traffic Using Massive MIMO and Large Intelligent Surfaces
2023) 13th International Workshop on Resilient Networks Design and Modeling, RNDM 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Preface
2023) Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, Proceedings In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 14154 LNCS.(
- Chapter in Book/Report/Conference proceeding › Preface to conference proceeding
-
Mark
Towards Practical Cell-Free 6G Network Deployments: An Open-Source End-to-End Ray Tracing Simulator
2023) Asilomar(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An Open Dataset Storage Standard for 6G Testbeds
2023) p.347-352(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation Attacks on Stream Ciphers
2023) p.143-154(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
PAPR : Publicly Auditable Privacy Revocation for Anonymous Credentials
2023) Cryptographers’ Track at the RSA Conference, CT-RSA 2023 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13871 LNCS. p.163-190(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Taming Cloud Integrated Systems in the Wild
2023)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Cooperative Vehicles versus Non-Cooperative Traffic Light : Safe and Efficient Passing
(
- Contribution to journal › Article
-
Mark
DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing
2023) 24th Privacy Enhancing Technologies Symposium, PETS 2024(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms
(
- Contribution to journal › Article
-
Mark
Constructive Dissonance in the Cloud: Adaptive Out-of-Phase Scheduling for Periodic Tasks
2023) International Conference on Cloud Networking(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack
2023) 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS) p.659-666(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key
2023) IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communication, TrustCom 2023 p.1718-1727(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Attacks Against Mobility Prediction in 5G Networks
2023) 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023 p.1502-1511(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SafeDeep: A Scalable Robustness Verification Framework for Deep Neural Networks
2023) IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
EpilepsyNet: Interpretable Self-Supervised Seizure Detection for Low-Power Wearable Systems
2023) 5th IEEE International Conference on Artificial Intelligence Circuits and Systems, AICAS 2023(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2022
-
Mark
Outsourcing MPC Precomputation for Location Privacy
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The 6G Computing Continuum (6GCC): Meeting the 6G computing challenges
2022) 1st International Conference on 6G Networking (6GNet 2022)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Chuchotage: In-line Software Network Protocol Translation for (D)TLS
2022) Proceedings of the 24th International Conference on Information and Communications Security, ICICS'22 p.589-607(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Intelligent multi-agent reinforcement learning model for resources allocation in cloud computing
(
- Contribution to journal › Article
-
Mark
Dynamic Federations for 6G Cell-Free Networking: Concepts and Terminology
2022) International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Progressive and efficient verification for digital signatures
2022) 20th International Conference on Applied Cryptography and Network Security, ACNS 2022 In Lecture Notes in Computer Science 13269. p.440-458(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Count Me In! Extendability for Threshold Ring Signatures
2022) 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2022 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13178. p.379-406(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Statistical guarantee of timeliness in networks of IoT devices
2022) In Telecommunication Systems(
- Contribution to journal › Article
-
Mark
Detection and mitigation of deception attacks on cloud-based industrial control systems
2022) 25th Conference on Innovation in Clouds, Internet and Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Preface
2022) 13th International Conference on Post-Quantum Cryptography, PQCrypto 2022 In Lecture Notes in Computer Science 13512 LNCS.(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Evaluation of Control over the Edge of a Configurable Mid-band 5G Base Station
2022) 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 In Proceedings - 6th IEEE International Conference on Fog and Edge Computing, ICFEC 2022 p.83-87(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Attacks on the Firekite Cipher
(
- Contribution to journal › Article
-
Mark
Prediction and exposure of delays from a base station perspective in 5G and beyond networks
2022) 2022 ACM SIGCOMM Workshop on 5G and Beyond Network Measurements, Modeling, and Use Cases, 5G-MeMU 2022, co-located with ACM SIGCOMM 2022 In 5G-MeMU 2022 - Proceedings of the ACM SIGCOMM 2022 Workshop on 5G and Beyond Network Measurements, Modeling, and Use Cases - Part of SIGCOMM 2022 p.8-14(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to Securing Software Updates in IoT
2022)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Insight of Anomaly Detection with NWDAF in 5G
2022) 2022 International Conference on Computer, Information and Telecommunication Systems (CITS)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SoK: Confidential Quartet - Comparison of Platforms for Virtualization-Based Confidential Computing
2022) 2022 IEEE International Symposium on Secure and Private Execution Environment Design p.109-120(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
2022) The 17th International Conference on Information Security Practice and Experience (ISPEC 2022) In Lecture Notes in Computer Science 13620.(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Light Signaling Approach to Node Grouping for Massive MIMO IoT Networks
(
- Contribution to journal › Article
-
Mark
Post-Quantum Cryptography : 13th International Workshop, PQCrypto 2022, Virtual Event, September 28–30, 2022, Proceedings
- Book/Report › Conference proceeding (editor)
-
Mark
Finding Collisions against 4-Round SHA-3-384 in Practical Time
(
- Contribution to journal › Article
-
Mark
LbSP : Load-Balanced Secure and Private Autonomous Electric Vehicle Charging Framework With Online Price Optimization
(
- Contribution to journal › Article
-
Mark
Bifrost : A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
SGX-Bundler: speeding up enclave transitions for IO-intensive applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
2022) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 In Communications in Computer and Information Science 1545 CCIS. p.22-47(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
CatNap : Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party
2022) 19th International Conference on Security and Cryptography, SECRYPT 2022 In Proceedings of the International Conference on Security and Cryptography 1. p.237-248(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
(
- Contribution to journal › Article
-
Mark
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
2022) 8th International Conference on Information Systems Security and Privacy, ICISSP 2022 p.145-153(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(3). p.223-263(
- Contribution to journal › Article
-
Mark
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
2022) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2022(4). p.800-827(
- Contribution to journal › Article
-
Mark
Secure Cloud Storage with Joint Deduplication and Erasure Protection
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Kub-Sec, an automatic Kubernetes cluster AppArmor profile generation engine
2022) 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022 In International Conference on Communication Systems and Networks p.129-137(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
Energy-Efficient Stable and Balanced Task Scheduling in Data Centers
(
- Contribution to journal › Article
-
Mark
Prototyping intrusion detection in an industrial cloud-native digital twin
2021) 2021 22nd IEEE International Conference on Industrial Technology (ICIT)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Joint Fog Service Placement and Scheduling for 5G-Enabled IoT, a Q-Learning Approach
2021) In IEEE Transactions on Cognitive Communications and Networking(
- Contribution to journal › Article
-
Mark
Lic-Sec: An enhanced AppArmor Docker security profile generator
(
- Contribution to journal › Article
-
Mark
AppArmor Profile Generator as a Cloud Service
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Demonstration: A cloud-control system equipped with intrusion detection and mitigation
2021) The Conference on Networked Systems (NetSys 2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Faster enclave transitions for IO-intensive network applications
2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Is Cloud RAN a Feasible Option for Industrial Communication Network?
(
- Contribution to journal › Article
-
Mark
Improvements on Making BKW Practical for Solving LWE
(
- Contribution to journal › Article
-
Mark
A side-channel attack on a masked IND-CCA secure saber KEM implementation
(
- Contribution to journal › Article
-
Mark
Improved guess-and-determine and distinguishing attacks on snow-v
(
- Contribution to journal › Article
-
Mark
SNOW-Vi : An extreme performance variant of SNOW-V for lower grade CPUs
2021) 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2021 p.261-272(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
2021) 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021 In Lecture Notes in Computer Science 13093. p.33-62(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEAD, Round 3 Tweak and Motivation
2021)(
- Book/Report › Report
-
Mark
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to Confidentiality and Integrity Algorithms for 5G
2021)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
LOVE a Pairing
2021) 7th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2021 In Lecture Notes in Computer Science 12912. p.320-340(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
2021) p.520-530(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the Sample Complexity of solving LWE using BKW-Style Algorithms
2021) 2021 IEEE International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
2021) EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems
2021) 2021 IEEE International Symposium on Information Theory(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improving DRX Performance For Emerging Use Cases In 5G
2021)(
- Thesis › Doctoral thesis (compilation)
-
Mark
A Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation
2021) 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Yggdrasil: Privacy-Aware Dual Deduplication in Multi Client Settings
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Enhancing Resilience of FSO Networks to Adverse Weather Conditions
(
- Contribution to journal › Article
-
Mark
A Permissioned Blockchain-based System for Collaborative Drug Discovery
2021) 7th International Conference on Information Systems Security and Privacy, ICISSP 2021 p.121-132(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Decentralized Dynamic PKI based on Blockchain
2021) The 36th ACM/SIGAPP Symposium on Applied Computing, SAC '21(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Punctual Cloud : Unbinding Real-time Applications from Cloud-induced Delays
2021) 2021 International Symposium on Networks, Computers and Communications, ISNCC 2021(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On-demand Key Distribution for Cloud Networks
2021) 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Demonstration : A cloud-native digital twin with adaptive cloud-based control and intrusion detection
(
- Contribution to journal › Article
-
Mark
X-Pro : Distributed XDP Proxies Against Botnets of Things
2021) 26th Nordic Conference on Secure IT Systems, NordSec 2021 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13115 LNCS. p.51-71(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Biased differential distinguisher – Cryptanalysis of reduced-round SKINNY
(
- Contribution to journal › Article
-
Mark
Evaluating the performance of the OSCORE security protocol in constrained IoT environments
(
- Contribution to journal › Article
- 2020
-
Mark
Flexible DRX Optimization for LTE and 5G
(
- Contribution to journal › Article
-
Mark
Solving LPN Using Covering Codes
(
- Contribution to journal › Article
-
Mark
Software Defined Networking for Emergency Traffic Management in Smart Cities
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Recommender System for User-Specific Vulnerability Scoring
2020) 14th International Conference on Risk and Security of Internet and Systems, CRISIS 2019 In Lecture Notes in Computer Science 12026. p.355-364(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Reliability, timeliness and load reduction at the edge for cloud gaming
2020) 38th IEEE International Performance Computing and Communications Conference, IPPCCC 2019(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Digital Twin Based Industrial Automation and Control System Security Architecture
(
- Contribution to journal › Article
-
Mark
Protecting OpenFlow using Intel SGX
2020) IEEE Conference on Network Function Virtualization and Software Defined Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Light Signalling Approach to Node Grouping for Massive MIMO IoT Networks
2020) In IEEE Transactions on Communications(
- Contribution to journal › Article
-
Mark
5G Radio Access Network Slicing in Massive MIMO Systems for Industrial Applications
2020) The Seventh International Conference on Software Defined Systems (SDS-2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
CLI-DOS : Collaborative Counteraction against Denial of Service in the Internet of Things
2020) 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Where are you bob? privacy-preserving proximity testing with a napping party
2020) 25th European Symposium on Research in Computer Security, ESORICS 2020 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12308 LNCS. p.677-697(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Secure generalized deduplication via multi-key revealing encryption
2020) 12th International Conference on Security and Cryptography for Networks, SCN 2020 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12238 LNCS. p.298-318(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Solutions for Constrained Devices in Cyber-Physical Systems
2020) In Series of licentiate and doctoral theses(
- Thesis › Licentiate thesis
-
Mark
Secure ownership transfer for the Internet of Things
2020) 6th International Conference on Information Systems Security and Privacy, ICISSP 2020 1. p.33-44(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Software Evaluation of Grain-128AEAD for Embedded Platforms
2020)(
- Book/Report › Report
-
Mark
On Lightweight Security for Constrained Environments
2020)(
- Thesis › Licentiate thesis
-
Mark
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
2020) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020(4). p.209-238(
- Contribution to journal › Article
-
Mark
Synchronization in Digital Twins for Industrial Control Systems
2020) 16th Swedish National Computer Networking Workshop (SNCNW 2020)(
- Contribution to conference › Paper, not in proceeding
-
Mark
Intrusion Detection in Digital Twins for Industrial Control Systems
2020) 28 th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Massive MIMO Pilot Scheduling over Cloud RAN
2020) 16th Swedish National Computer Networking Workshop (SNCNW 2020)(
- Contribution to conference › Paper, not in proceeding
-
Mark
Content and Resource Management in Edge Networks
2020)(
- Thesis › Doctoral thesis (compilation)
-
Mark
DRX-Aware RAN Slicing for eMBB and mMTC Services
2020) In IEEE Transactions on Network and Service Management(
- Contribution to journal › Article
-
Mark
Energy Consumption for Securing Lightweight IoT Protocols
2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Towards intelligent Industry 4.0 5G networks: A first throughput and QoE measurement campaign
2020) 28 th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Massive MIMO Pilot Scheduling over Cloud RAN for Industry 4.0
2020) 28 th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Electromagnetic Side-Channel Attack on AES using Low-end Equipment
(
- Contribution to journal › Article
-
Mark
Internet of Reliable Things: Toward D2D-enabled NB-IoT
2020) Fifth International Conference on Fog and Mobile Edge Computing (FMEC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modeling DRX for D2D Communication
(
- Contribution to journal › Article
-
Mark
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM
2020) 40th Annual International Cryptology Conference, CRYPTO 2020 In Lecture Notes in Computer Science 12171. p.359-386(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
(
- Contribution to journal › Article
-
Mark
On the Suitability of Using SGX for Secure Key Storage in the Cloud
2020) 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus2020 12395. p.32-47(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Spectral analysis of ZUC-256
(
- Contribution to journal › Article
-
Mark
Automated CPE Labeling of CVE Summaries with Machine Learning
2020) 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12223 LNCS. p.3-22(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Extended Analysis of Age of Information Threshold Violations
(
- Contribution to journal › Article
-
Mark
Evaluation of the HAVOSS software process maturity model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy versus throughput optimisation for machine-to-machine communication
(
- Contribution to journal › Article
-
Mark
A Survey of Published Attacks on Intel SGX
2020)(
- Book/Report › Report
-
Mark
An overview of cryptographic primitives for possible use in 5G and beyond
(
- Contribution to journal › Scientific review
-
Mark
Making the BKW Algorithm Practical for LWE
2020) International Conference on Cryptology in India - INDOCRYPT 2020 In Lecture Notes in Computer Science 12578. p.417-439(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some Notes on Post-Quantum Cryptanalysis
2020)(
- Thesis › Doctoral thesis (compilation)
-
Mark
A New Decryption Failure Attack Against HQC
2020) 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 In Lecture Notes in Computer Science 12491. p.353-382(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Certification of students in non-technical engineering skills : What do the companies think?
2020) 11th International Conference on Society and Information Technologies, ICSIT 2020 In ICSIT 2020 - 11th International Conference on Society and Information Technologies, Proceedings p.49-54(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Improved Decoders for p-ary MDPC
2019) 11th International Workshop on Coding and Cryptography (WCC) 2019(
- Contribution to conference › Paper, not in proceeding
-
Mark
Guarding the Guards: Accountable Authorities in VANETs
2019) 2018 IEEE Vehicular Networking Conference (VNC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Massive MIMO Optimization with Compatible Sets
2019)(
- Book/Report › Report
-
Mark
Massive MIMO Optimization with Compatible Sets
(
- Contribution to journal › Article
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
(
- Contribution to journal › Article
-
Mark
Some Cryptanalytic and Coding-Theoretic Applications of a Soft Stern Algorithm
(
- Contribution to journal › Article
-
Mark
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes
2019) 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC), 2019 In Lecture Notes in Computer Science 11443. p.565-598(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
A new birthday-type algorithm for attacking the fresh re-keying countermeasure
(
- Contribution to journal › Article
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article
-
Mark
SDN Access Control for the Masses
(
- Contribution to journal › Article
-
Mark
Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Vectorized linear approximations for attacks on SNOW 3G
2019) 27th Annual Fast Software Encryption Conference, FSE 2020 In IACR Transactions on Symmetric Cryptology 2019(4). p.249-271(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to Preventive Measures in Cyber Security
2019) In Series of licentiate and doctoral theses(
- Thesis › Doctoral thesis (compilation)
-
Mark
A new SNOW stream cipher called SNOW-V
(
- Contribution to journal › Article
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis of Age of Information threshold violations
2019) 22nd ACM International Conference on Modeling, Analysis(
and Simulation of Wireless and Mobile Systems- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Asymptotic Complexity of Coded-BKW with Sieving Using Increasing Reduction Factors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks
2019) International Workshop on Resilient Networks Design and Modelling, RNDM 2019(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Network Lifetime Maximization in Wireless Mesh Networks for Machine-to-Machine Communication
2019) In Ad Hoc Networks(
- Contribution to journal › Article
-
Mark
Metadata filtering for user-friendly centralized biometric authentication
(
- Contribution to journal › Article
-
Mark
Massive MIMO C-Set Optimisation
2019)(
- Non-textual form › Software
-
Mark
An AEAD Variant of the Grain Stream Cipher
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Protecting OpenFlow Flow Tables with Intel SGX
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Privacy-enabled Recommendations for Software Vulnerabilities
2019) 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A novel CCA attack using decryption errors against LAC
2019) 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11921 LNCS. p.82-111(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Validation of SDN policies: a property-based testing perspective
2019) 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) In Procedia Computer Science 160. p.23-29(
- Contribution to journal › Article
-
Mark
Efficient Hardware Implementations of Grain-128AEAD
2019) 20th International Conference on Cryptology in India, INDOCRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11898 LNCS. p.495-513(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Online Learning and Placement Algorithms for Efficient Delivery of User Generated Contents in Telco-CDNs
(
- Contribution to journal › Article
-
Mark
Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving
2019) Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics
2019) 2019 IEEE International Conference on Big Data, Big Data 2019 In Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019 p.5744-5753(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Wireless Body Area Networks: Security Issues and Challenges
2019) Øresund Security Day(
- Contribution to conference › Abstract
-
Mark
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke
2019)(
- Working paper/Preprint › Preprint in preprint archive
- 2018
-
Mark
Ouroboros-E : An Efficient Lattice-based Key-Exchange Protocol
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Routing Protocol for LoRA Mesh Networks
2018) Seventh IEEE WoWMoM Workshop on the Internet of Things: Smart Objects and Services (IoT-SoS)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Protecting Wireless Mesh Networks Against Adverse Weather Conditions
2018) 10th International Workshop on Resilient Networks Design and Modeling (RNDM)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Error Amplification in Code-based Cryptography
2018) In IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2019(1). p.238-258(
- Contribution to journal › Article
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Trust Anchors in Software Defined Networks
2018) European Symposium on Research in Computer Security In Lecture Notes in Computer Science 11009. p.485-505(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Practical Attacks on Relational Databases Protected via Searchable Encryption
2018) 21st Information Security Conference, ISC 2018 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11060 LNCS. p.171-191(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
(
- Contribution to journal › Article
-
Mark
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
2018) International Conference on on Product-Focused Software Process Improvement (PROFES 2018) In Lecture Notes in Computer Science 11271. p.81-97(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Path Generation for Affine Flow Thinning
(
- Contribution to journal › Article
-
Mark
Engaging Students using GitHub as a Learning Management System
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy-Optimal Data Aggregation and Dissemination for the Internet of Things
(
- Contribution to journal › Article
-
Mark
Social Norms and the Dominance of Low-Doers
(
- Contribution to journal › Article
- 2017
-
Mark
Optimizing DRX for Video delivery over LTE: Utilizing Channel Prediction and In-network caching
2017) Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2017(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Greedy Nonrandomness Detectors for Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Standard-compliant LTE-A Uplink Scheduling Scheme with Quality of Service
(
- Contribution to journal › Article
-
Mark
Editorial : Special issue on coding and cryptography
(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Information Set Decoding with Soft Information and some cryptographic applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
OpenSAW: Open Security Analysis Workbench
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Searchable Encrypted Relational Databases: Risks and Countermeasures
(
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Bootstrapping trust in software defined networks
(
- Contribution to journal › Article
-
Mark
Improving Throughput and Minimizing Age of Information in dense WLANs, Using Cooperative Techniques
2017) In Series of licentiate and doctoral theses(
- Thesis › Licentiate thesis
-
Mark
Dynamic Fault-Tolerance and Mobility Provisioning for Services on Mobile Cloud Platforms
2017) 5th IEEE International Conference on Mobile Cloud Computing, Services and Engineering, MobileCloud 2017 p.131-138(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Wireless network generator
2017)(
- Non-textual form › Software
-
Mark
An optimization model for affine flow thinning - A traffic protection mechanism for FSO networks
2017) 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On robust FSO network dimensioning
2017) 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Trust but Verify : Trust Establishment Mechanisms in Infrastructure Clouds
2017)(
- Thesis › Doctoral thesis (compilation)
-
Mark
Coded-BKW with Sieving
2017) 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), 2017 In Lecture Notes in Computer Science 10624. p.323-346(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An Online Placement Mechanism for Efficient Delivery of User Generated Content
2017) IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD) In IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Modifying Backoff Freezing Mechanism to Optimize Dense IEEE 802.11 Networks
(
- Contribution to journal › Article
-
Mark
A reaction attack on the QC-LDPC mceliece cryptosystem
2017) 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10346 LNCS. p.51-68(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Dynamic Server Provisioning with Queue Stabilization in Data Centres
2017) 6th IEEE International Conference on Cloud Networking (IEEE CloudNet 2017)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems
2016)(
- Thesis › Doctoral thesis (compilation)
-
Mark
The Effect of Hidden Terminal Interference on Safety-Critical Traffic in Vehicular Ad Hoc Networks
2016) 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications p.75-82(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Autonomy in PhD-education – Supervising for Independence
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Packet routing and frame length optimization in wireless mesh networks with multicast communications
2016) 17th International Telecommunications Network Strategy and Planning Symposium, Networks 2016(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Solving NTRU Challenges Using the New Progressive BKZ Library
2016)(
- Thesis › Master's thesis
-
Mark
Scheduling library
2016)(
- Non-textual form › Software
-
Mark
A comparative Study of the Energy Consumption and Quality of Experience in H.264/AVC and H.265/HEVC based Video Delivery on WiFi Networks
2016) 12th Swedish National Computer Networking Workshop (SNCNW 2016)(
- Contribution to conference › Paper, not in proceeding
- 2011
-
Mark
Network optimization techniques
2011) p.627-690(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 1994
-
Mark
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol
1994) 14th annual cryptographic conference CRYPTO '94 In Lecture Notes in Computer Science 839. p.121-128(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding