Networks and Security

Organisational unit: Research group

More filtering options
  1. 2019
  2. Metadata filtering for user-friendly centralized biometric authentication

    Christian Gehrmann, Marcus Rodan & Jönsson, N., 2019 Jun 6, In : EURASIP Journal on Information Security. 2019, 1, 17 p., 7.

    Research output: Contribution to journalArticle

  3. Massive MIMO Optimization with Compatible Sets

    Emma Fitzgerald, Pióro, M. & Fredrik Tufvesson, 2019 Mar

    Research output: Book/ReportReport

  4. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, In : IEEE Transactions on Information Theory. 65, 3, p. 1845 - 1861 17 p.

    Research output: Contribution to journalArticle

  5. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Meier, W., Jonathan Sönnerup & Yoshida, H., 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (eds.). Springer Nature Switzerland AG, p. 55-71 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    D'Anvers, J., Qian Guo, Thomas Johansson, Alexander Nilsson, Vercauteren, F. & Verbauwhede, I., 2019, Public-Key Cryptography – PKC 2019. Springer, p. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  7. Guarding the Guards: Accountable Authorities in VANETs

    Joakim Brorsson, Paul Stankovski & Martin Hell, 2019, 2018 IEEE Vehicular Networking Conference (VNC). 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. Improved Decoders for p-ary MDPC

    Canales-Martinez, I., Qian Guo & Thomas Johansson, 2019. 11 p.

    Research output: Contribution to conferencePaper, not in proceeding

  9. Massive MIMO C-Set Optimisation

    Emma Fitzgerald, 2019

    Research output: Non-textual formSoftware

  10. Massive MIMO Optimization with Compatible Sets

    Emma Fitzgerald, Pióro, M. & Fredrik Tufvesson, 2019, In : IEEE Transactions on Wireless Communications. p. 2794 - 2812

    Research output: Contribution to journalArticle

  11. SDN Access Control for the Masses

    Nicolae Paladi & Christian Gehrmann, 2019, In : Computers and Security. 80, p. 155-172 18 p.

    Research output: Contribution to journalArticle

  12. 2018
  13. Engaging Students using GitHub as a Learning Management System

    Sara Gunnarsson, Larsson, P., Sara Månsson, Erik Mårtensson & Jonathan Sönnerup, 2018 Sep, Lunds universitets pedagogiska utvecklingskonferens 2017. Lund: AHU, Lunds universitet, p. 63-70 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. A Routing Protocol for LoRA Mesh Networks

    Lundell, D., Hedberg, A., Christian Nyberg & Emma Fitzgerald, 2018 Aug 30, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 6 p. 18074086

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  15. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Deneuville, J. C., Gaborit, P., Qian Guo & Thomas Johansson, 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 1450-1454 5 p. 8437940

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  16. Trust Anchors in Software Defined Networks

    Nicolae Paladi, Linus Karlsson & Elbashir, K., 2018 Aug 7, 23rd European Symposium on Research in Computer Security, ESORICS 2018. Springer Verlag, Vol. 11099. p. 485-505 20 p. (Lecture Notes in Computer Science; vol. 11009).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  17. Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions

    Pióro, M., Tomaszewski, A. & Capone, A., 2018 Aug 1, In : Ad Hoc Networks. 77, p. 119-142 24 p.

    Research output: Contribution to journalArticle

  18. Path Generation for Affine Flow Thinning

    Pióro, M., Kalesnikau, I. & Poss, M., 2018 Feb 1, In : Electronic Notes in Discrete Mathematics. 64, p. 355-364 10 p.

    Research output: Contribution to journalArticle

  19. Social Norms and the Dominance of Low-Doers

    Carlo Proietti & Antonio Franco, 2018 Jan 31, In : Journal of Artificial Societies and Social Simulation. 21, 1, 6.

    Research output: Contribution to journalArticle

  20. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 Jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer Verlag, p. 273-294 22 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  21. Energy-Optimal Data Aggregation and Dissemination for the Internet of Things

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, In : IEEE Internet of Things Journal. 5, 2, p. 955-969 15 p.

    Research output: Contribution to journalArticle

  22. Evaluating Security of Software Through Vulnerability Metrics

    Jonathan Sönnerup & Martin Hell, 2018, Proceedings of the 2018 International Conference on Security & Management. p. 79 85 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  23. HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components

    Pegah Nikbakht Bideh, Martin Höst & Martin Hell, 2018, Product-Focused Software Process Improvement. Springer Verlag, p. 81-97 16 p. ( Lecture Notes in Computer Science; vol. 11271).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  24. Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

    Cobleigh, A., Martin Hell, Linus Karlsson, Reimer, O., Jonathan Sönnerup & Wisenhoff, D., 2018, IEEE 22nd International Enterprise Distributed Object Computing Workshop. IEEE--Institute of Electrical and Electronics Engineers Inc., 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  25. Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study

    Martin Höst, Jonathan Sönnerup, Martin Hell & Olsson, T., 2018, Proceedings of the 2018 International Conference on Software Engineering Research & Practice. p. 61-67

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  26. Practical Attacks on Relational Databases Protected via Searchable Encryption

    Abdelraheem, M. A., Andersson, T., Christian Gehrmann & Glackin, C., 2018, Information Security - 21st International Conference, ISC 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Springer Verlag, p. 171-191 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11060 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  27. Protecting Wireless Mesh Networks Against Adverse Weather Conditions

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, 2018 10th International Workshop on Resilient Networks Design and Modeling (RNDM). Institute of Electrical and Electronics Engineers Inc., 7 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  28. 2017
  29. An optimization model for affine flow thinning - A traffic protection mechanism for FSO networks

    Pioro, M., Kalesnikau, I. & Poss, M., 2017 Oct 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093015

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  30. On robust FSO network dimensioning

    D'Andreagiovanni, F., Nace, D., Pioro, M., Foss, M., Shehaj, M. & Tomaszewski, A., 2017 Oct 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093027

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  31. An Online Placement Mechanism for Efficient Delivery of User Generated Content

    Mohammadhassan Safavi, Bastani, S. & Björn Landfeldt, 2017 Sep 14, IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2017 . Institute of Electrical and Electronics Engineers Inc., 7 p. (IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  32. Trust but Verify: Trust Establishment Mechanisms in Infrastructure Clouds

    Nicolae Paladi, 2017 Sep 4, 1 ed. Lund: The Department of Electrical and Information Technology. 224 p.

    Research output: ThesisDoctoral Thesis (compilation)

  33. Dynamic Fault-Tolerance and Mobility Provisioning for Services on Mobile Cloud Platforms

    Stahl, P., Broberg, J. & Björn Landfeldt, 2017 Jun 8, Proceedings - 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2017. Institute of Electrical and Electronics Engineers Inc., p. 131-138 8 p. 7944883

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  34. OpenSAW: Open Security Analysis Workbench

    Ben Henda, N., Johansson, B., Lantz, P., Norrman, K., Saaranen, P. & Segersvärd, O., 2017 Apr 22, Fundamental Approaches to Software Engineering: 20th International Conference, FASE 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Huisman, M. & Rubin, J. (eds.). 1 ed. Berlin Heidelberg: Springer Verlag, Vol. 10202. p. 321-337 16 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  35. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 Feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  36. Standard-compliant LTE-A Uplink Scheduling Scheme with Quality of Service

    Ragaleux, A., Baey, S. & Karaca, M., 2017 Jan 17, In : IEEE Transactions on Vehicular Technology. p. 7207 - 7222

    Research output: Contribution to journalArticle

  37. Searchable Encrypted Relational Databases: Risks and Countermeasures

    Abdelraheem, M. A., Andersson, T. & Christian Gehrmann, 2017 Jan 10, Cryptology ePrint Archive, 2017, 24, p. 1-20 20 p.

    Research output: Contribution to specialist publication or newspaperSpecialist publication article

  38. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 Jan, In : Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.

    Research output: Contribution to journalDebate/Note/Editorial

  39. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer Verlag, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  40. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  41. Dynamic Server Provisioning with Queue Stabilization in Data Centres

    Mohammadhassan Safavi, Karaca, M., Bastani, S. & Björn Landfeldt, 2017, IEEE International Conference on Cloud Networking. IEEE--Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  42. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  43. Modifying Backoff Freezing Mechanism to Optimize Dense IEEE 802.11 Networks

    Karaca, M., Bastani, S. & Björn Landfeldt, 2017, In : IEEE Transactions on Vehicular Technology. 66, 10, p. 9470 - 9482

    Research output: Contribution to journalArticle

  44. Optimizing DRX for Video delivery over LTE: Utilizing Channel Prediction and In-network caching

    Farnaz Moradi, Karaca, M., Emma Fitzgerald, Pioro, M., Ljung, R. & Björn Landfeldt, 2017, 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2017. Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  45. Wireless network generator

    Emma Fitzgerald, 2017

    Research output: Non-textual formSoftware

  46. 2016
  47. Autonomy in PhD-education – Supervising for Independence

    Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson, 2016 Dec 15, LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, p. 9-13 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  48. Packet routing and frame length optimization in wireless mesh networks with multicast communications

    Tomaszewski, A. & Pioro, M., 2016 Nov 21, 2016 17th International Telecommunications Network Strategy and Planning Symposium, Networks 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 6 p. 7751144

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  49. Scheduling library

    Emma Fitzgerald, 2016

    Research output: Non-textual formSoftware

Previous 1 2 Next