Networks and Security

Organisational unit: Research group

More filtering options
  1. 2021
  2. A Decentralized Dynamic PKI based on Blockchain

    Mohsen Toorani & Christian Gehrmann, 2021 Mar 22, (Accepted/In press) Proceedings of the 36th ACM/SIGAPP Symposium On Applied Computing (SAC'21). Association for Computing Machinery (ACM), 10 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. On-demand Key Distribution for Cloud Networks

    Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh & Martin Hell, 2021 Mar 4, (Accepted/In press) Proceedings of the 24th Conference on Innovation in Clouds, Internet and Networks.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. Prototyping intrusion detection in an industrial cloud-native digital twin

    William Tärneberg, Per Skarin, Christian Gehrmann & Maria Kihl, 2021 Mar, International Conference on Industrial Technology. IEEE - Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. A Permissioned Blockchain-based System for Collaborative Drug Discovery

    Christoffer Olsson & Mohsen Toorani, 2021 Feb 11, Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP’21). SciTePress, p. 121-132 12 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. 2020
  7. A New Decryption Failure Attack Against HQC

    Qian Guo & Thomas Johansson, 2020 Dec 6, Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I. Springer, p. 353-382 (Lecture Notes in Computer Science; vol. 12491).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. Making the BKW Algorithm Practical for LWE

    Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski Wagner, 2020 Dec, Progress in Cryptology – INDOCRYPT 2020: 21st International Conference on Cryptology in India Bangalore, India, December 13–16, 2020 Proceedings. Springer, p. 417-439 23 p. (Lecture Notes in Computer Science; vol. 12578).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  9. Content and Resource Management in Edge Networks

    Mohammadhassan Safavi, 2020 Sep 22, Department of Electroscience, Lund University. 234 p.

    Research output: ThesisDoctoral Thesis (compilation)

  10. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

    Qian Guo, Vincent Grosso, François-Xavier Standaert & Olivier Bronchain, 2020 Aug 26, In: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2020, 4, p. 209-238 30 p.

    Research output: Contribution to journalArticle

  11. A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM

    Qian Guo, Thomas Johansson & Alexander Nilsson, 2020 Aug 17, Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II. Springer, p. 359-386 (Lecture Notes in Computer Science; vol. 12171).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  12. Extended Analysis of Age of Information Threshold Violations

    Antonio Franco, Björn Landfeldt & Ulf Körner, 2020 Aug 3, In: Computer Communications. 161, p. 191-201 11 p.

    Research output: Contribution to journalArticle

  13. Electromagnetic Side-Channel Attack on AES using Low-end Equipment

    Oskar Westman & Martin Hell, 2020 Jun 3, In: ECTI Transactions on Computer and Information Technology. 14, 2, p. 139-148

    Research output: Contribution to journalArticle

  14. Software Evaluation of Grain-128AEAD for Embedded Platforms

    Alexander Maximov & Martin Hell, 2020 Jun 1, IACR.

    Research output: Book/ReportReport

  15. Massive MIMO Pilot Scheduling over Cloud RAN

    Haorui Peng, William Tärneberg, Emma Fitzgerald & Maria Kihl, 2020 May 27.

    Research output: Contribution to conferencePaper, not in proceeding

  16. Spectral analysis of ZUC-256

    Jing Yang, Thomas Johansson & Alexander Maximov, 2020 May 7, In: IACR Transactions on Symmetric Cryptology. 2020, 1, p. 266-288 23 p.

    Research output: Contribution to journalArticle

  17. Software Defined Networking for Emergency Traffic Management in Smart Cities

    Pegah Nikbakht Bideh, Nicolae Paladi & Martin Hell, 2020 Apr 8, Vehicular Ad-hoc Networks for Smart Cities: Third International Workshop, 2019. Laouiti, A., Qayyum, A. & Saad, M. N. M. (eds.). Springer, p. 59-70 12 p. (Advances in Intelligent Systems and Computing, AISC; vol. 1144).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  18. A Survey of Published Attacks on Intel SGX

    Alexander Nilsson, Pegah Nikbakht Bideh & Joakim Brorsson, 2020 Mar 25, 11 p.

    Research output: Book/ReportReport

  19. Protecting OpenFlow using Intel SGX

    Jorge Medina, Nicolae Paladi & Patrik Arlos, 2020 Mar 19, IEEE Conference on Network Function Virtualization and Software Defined Networks: (NFV-SDN). IEEE - Institute of Electrical and Electronics Engineers Inc., 9039980

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  20. Reliability, timeliness and load reduction at the edge for cloud gaming

    Antonio Franco, Emma Fitzgerald, Björn Landfeldt & Ulf Körner, 2020 Jan 16, International Performance Computing and Communications Conference. Piscataway: IEEE - Institute of Electrical and Electronics Engineers Inc., 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  21. Solving LPN Using Covering Codes

    Qian Guo, Thomas Johansson & Carl Löndahl, 2020 Jan, In: Journal of Cryptology. 33, 1, p. 1-33 33 p.

    Research output: Contribution to journalArticle

  22. 5G Radio Access Network Slicing in Massive MIMO Systems for Industrial Applications

    Haorui Peng, Emma Fitzgerald, William Tärneberg & Maria Kihl, 2020, 2020 Seventh International Conference on Software Defined Systems (SDS). IEEE - Institute of Electrical and Electronics Engineers Inc., 6 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  23. An overview of cryptographic primitives for possible use in 5G and beyond

    Jing Yang & Thomas Johansson, 2020, In: Science China Information Sciences. 63, 12, 220301.

    Research output: Contribution to journalReview article

  24. A Recommender System for User-Specific Vulnerability Scoring

    Linus Karlsson, Pegah Nikbakht Bideh & Martin Hell, 2020, CRiSIS 2019: Risks and Security of Internet and Systems. Springer, p. 355-364 ( Lecture Notes in Computer Science; vol. 12026).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  25. Automated CPE Labeling of CVE Summaries with Machine Learning

    Emil Wåreus & Martin Hell, 2020, Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Proceedings. Maurice, C., Bilge, L., Stringhini, G. & Neves, N. (eds.). Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  26. Certification of students in non-technical engineering skills: What do the companies think?

    Christin Lindholm & Christian Nyberg, 2020, ICSIT 2020 - 11th International Conference on Society and Information Technologies, Proceedings. Callaos, N. C., Robertson, L., Sanchez, B. & Tremante, A. (eds.). International Institute of Informatics and Systemics, p. 49-54 6 p. (ICSIT 2020 - 11th International Conference on Society and Information Technologies, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  27. CLI-DOS: Collaborative Counteraction against Denial of Service in the Internet of Things

    Syafiq Al Atiiq & Christian Gehrmann, 2020, 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020. Institute of Electrical and Electronics Engineers Inc., 9156207

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  28. Energy Consumption for Securing Lightweight IoT Protocols

    Pegah Nikbakht Bideh, Jonathan Sönnerup & Martin Hell, 2020, The 10th International Conference on the Internet of Things (IoT 2020). Association for Computing Machinery (ACM), 8 p. 16

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  29. Energy versus throughput optimisation for machine-to-machine communication

    Emma Fitzgerald, Michał Pióro & Artur Tomaszewski, 2020, In: Sensors (Switzerland). 20, 15, 19 p., 4122.

    Research output: Contribution to journalArticle

  30. Evaluation of the HAVOSS software process maturity model

    Martin Höst & Martin Hell, 2020, Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE - Institute of Electrical and Electronics Engineers Inc., p. 137-140 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  31. Internet of Reliable Things: Toward D2D-enabled NB-IoT

    Krzysztof Malarski, Farnaz Moradi, Kalpit Dilip Ballal, Lars Dittmann & Sarah Ruepp, 2020, 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE - Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  32. Intrusion Detection in Digital Twins for Industrial Control Systems

    Fatemeh Akbarian, Emma Fitzgerald & Maria Kihl, 2020, 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  33. Massive MIMO Pilot Scheduling over Cloud RAN for Industry 4.0

    Haorui Peng, William Tärneberg, Emma Fitzgerald & Maria Kihl, 2020, 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE - Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  34. Modeling DRX for D2D Communication

    Farnaz Moradi, Emma Fitzgerald & Björn Landfeldt, 2020, In: IEEE Internet of Things Journal. 8, 4, p. 2574 - 2584

    Research output: Contribution to journalArticle

  35. On Lightweight Security for Constrained Environments

    Jonathan Sönnerup, 2020, Lunds Universitet/Lunds Tekniska Högskola. 113 p.

    Research output: ThesisLicentiate Thesis

  36. On the Suitability of Using SGX for Secure Key Storage in the Cloud

    Joakim Brorsson, Pegah Nikbakht Bideh, Alexander Nilsson & Martin Hell, 2020, Lecture Notes in Computer Science . Springer Science + Business Media, Vol. 12395. p. 32-47

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  37. Resilience through multicast – An optimization model for multi-hop wireless sensor networks

    Bartłomiej Ostrowski, Michał Pióro, Artur Tomaszewski & Emma Fitzgerald, 2020, In: Ad Hoc Networks. 107, 102239.

    Research output: Contribution to journalArticle

  38. Secure generalized deduplication via multi-key revealing encryption

    Daniel E. Lucani, Lars Nielsen, Claudio Orlandi, Elena Pagnin & Rasmus Vestergaard, 2020, Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer Science + Business Media, p. 298-318 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12238 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  39. Secure ownership transfer for the Internet of Things

    Martin Gunnarsson & Christian Gehrmann, 2020, Proceedings of the 6th International Conference on Information Systems Security and Privacy. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). SciTePress, Vol. 1. p. 33-44 12 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  40. Security Solutions for Constrained Devices in Cyber-Physical Systems

    Martin Gunnarsson, 2020, Lund: Elektro- och informationsteknik. 144 p.

    Research output: ThesisLicentiate Thesis

  41. Some Notes on Post-Quantum Cryptanalysis

    Erik Mårtensson, 2020, Lund: Department of Electroscience, Lund University. 290 p.

    Research output: ThesisDoctoral Thesis (compilation)

  42. Synchronization in Digital Twins for Industrial Control Systems

    Fatemeh Akbarian, Emma Fitzgerald & Maria Kihl, 2020.

    Research output: Contribution to conferencePaper, not in proceeding

  43. Towards intelligent Industry 4.0 5G networks: A first throughput and QoE measurement campaign

    William Tärneberg, Omar Hamsis, Johan Hedlund, Kjell Brunnström, Emma Fitzgerald, Andreas Johnsson, Victor Berggren, Maria Kihl, Akhila Rao, Rebecca Steinert & Caner Kilic, 2020, 2020 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE - Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  44. Where are you bob? privacy-preserving proximity testing with a napping party

    Ivan Oleynikov, Elena Pagnin & Andrei Sabelfeld, 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science + Business Media, p. 677-697 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  45. 2019
  46. Analysis of Age of Information threshold violations

    Antonio Franco, Björn Landfeldt & Ulf Körner, 2019 Nov 25, ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York: Association for Computing Machinery (ACM), 10 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

Previous 1 2 3 Next