1 – 50 of 78
- show: 50
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
2022) p.84-95(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2021
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
2021) p.520-530(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On-demand Key Distribution for Cloud Networks
2021) 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
2021) EAI SecureComm 2021 - 17th EAI International Conference on Security and Privacy in Communication Networks(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Grain-128AEAD, Round 3 Tweak and Motivation
2021)(
- Book/Report › Report
- 2020
-
Mark
A Recommender System for User-Specific Vulnerability Scoring
2020) 14th International Conference on Risk and Security of Internet and Systems, CRISIS 2019 In Lecture Notes in Computer Science 12026. p.355-364(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Software Defined Networking for Emergency Traffic Management in Smart Cities
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Electromagnetic Side-Channel Attack on AES using Low-end Equipment
(
- Contribution to journal › Article
-
Mark
On the Suitability of Using SGX for Secure Key Storage in the Cloud
2020) 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus2020 12395. p.32-47(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Automated CPE Labeling of CVE Summaries with Machine Learning
2020) 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12223 LNCS. p.3-22(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Energy Consumption for Securing Lightweight IoT Protocols
2020)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Software Evaluation of Grain-128AEAD for Embedded Platforms
2020)(
- Book/Report › Report
-
Mark
Evaluation of the HAVOSS software process maturity model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Guarding the Guards: Accountable Authorities in VANETs
2019) 2018 IEEE Vehicular Networking Conference (VNC)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An AEAD Variant of the Grain Stream Cipher
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
-
Mark
Efficient Hardware Implementations of Grain-128AEAD
2019) 20th International Conference on Cryptology in India, INDOCRYPT 2019 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11898 LNCS. p.495-513(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2018
-
Mark
Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code
2018)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluating Security of Software Through Vulnerability Metrics
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
2018) International Conference on on Product-Focused Software Process Improvement (PROFES 2018) In Lecture Notes in Computer Science 11271. p.81-97(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Not so greedy : Enhanced subset exploration for nonrandomness detectors
2018) International Conference on Information Systems Security and Privacy In Communications in Computer and Information Science 867. p.273-294(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2017
-
Mark
Espresso: A stream cipher for 5G wireless communication systems
(
- Contribution to journal › Article
-
Mark
Blockchain-based publishing layer for the Keyless Signing Infrastructure
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Greedy Nonrandomness Detectors for Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
Exploiting Trust in Deterministic Builds
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Enabling Key Migration Between Non-Compatible TPM Versions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2015
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
(
- Contribution to journal › Article
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Efficiency of Optimal Sampling in the Random S-box Model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
2014)(
- Book/Report › Report
- 2013
-
Mark
Improved Key Recovery Attack on the BEAN Stream Cipher
2013) In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96A(6). p.1437-1444(
- Contribution to journal › Article
-
Mark
A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
A Survey on Fast Correlation Attacks
(
- Contribution to journal › Scientific review
-
Mark
An Optimal Sampling Technique for Distinguishing Random S-boxes
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis of Xorrotation With Application to an HC-128 Variant
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
(
- Contribution to journal › Article
-
Mark
Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On Hardware-Oriented Message Authentication
(
- Contribution to journal › Article
- 2011
-
Mark
Grain-128a: a new version of Grain-128 with optional authentication
(
- Contribution to journal › Article
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
(
- Contribution to journal › Article
-
Mark
Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
2011)(
- Book/Report › Report
-
Mark
Searching for new convolutional codes using the cell broadband engine architecture
(
- Contribution to journal › Article