Networks and Security

Organisational unit: Research group

More filtering options
  1. Searchable Encrypted Relational Databases: Risks and Countermeasures

    Abdelraheem, M. A., Andersson, T. & Christian Gehrmann, 2017 Jan 10, Cryptology ePrint Archive, 2017, 24, p. 1-20 20 p.

    Research output: Contribution to specialist publication or newspaperSpecialist publication article

  2. Practical Attacks on Relational Databases Protected via Searchable Encryption

    Abdelraheem, M. A., Andersson, T., Christian Gehrmann & Glackin, C., 2018, Information Security - 21st International Conference, ISC 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Springer, p. 171-191 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11060 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. The Effect of Hidden Terminal Interference on Safety-Critical Traffic in Vehicular Ad Hoc Networks

    Bastani, S. & Björn Landfeldt, 2016, Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '16). ACM, NY, USA, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. OpenSAW: Open Security Analysis Workbench

    Ben Henda, N., Johansson, B., Lantz, P., Norrman, K., Saaranen, P. & Segersvärd, O., 2017 Apr 22, Fundamental Approaches to Software Engineering: 20th International Conference, FASE 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Huisman, M. & Rubin, J. (eds.). 1 ed. Berlin Heidelberg: Springer, Vol. 10202. p. 321-337 16 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. Autonomy in PhD-education – Supervising for Independence

    Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson, 2016 Dec 15, LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, p. 9-13 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. Guarding the Guards: Accountable Authorities in VANETs

    Joakim Brorsson, Paul Stankovski & Martin Hell, 2019, 2018 IEEE Vehicular Networking Conference (VNC). 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  7. Improved Decoders for p-ary MDPC

    Canales-Martinez, I., Qian Guo & Thomas Johansson, 2019. 11 p.

    Research output: Contribution to conferencePaper, not in proceeding

  8. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 Jan, In : Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.

    Research output: Contribution to journalDebate/Note/Editorial

  9. Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

    Cobleigh, A., Martin Hell, Linus Karlsson, Reimer, O., Jonathan Sönnerup & Wisenhoff, D., 2018, IEEE 22nd International Enterprise Distributed Object Computing Workshop. IEEE - Institute of Electrical and Electronics Engineers Inc., 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  10. On robust FSO network dimensioning

    D'Andreagiovanni, F., Nace, D., Pioro, M., Foss, M., Shehaj, M. & Tomaszewski, A., 2017 Oct 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093027

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    D'Anvers, J., Qian Guo, Thomas Johansson, Alexander Nilsson, Vercauteren, F. & Verbauwhede, I., 2019, Public-Key Cryptography – PKC 2019. Springer, p. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  12. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Deneuville, J. C., Gaborit, P., Qian Guo & Thomas Johansson, 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 1450-1454 5 p. 8437940

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  13. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. Scheduling library

    Emma Fitzgerald, 2016

    Research output: Non-textual formSoftware

  15. Wireless network generator

    Emma Fitzgerald, 2017

    Research output: Non-textual formSoftware

  16. Energy-Optimal Data Aggregation and Dissemination for the Internet of Things

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, In : IEEE Internet of Things Journal. 5, 2, p. 955-969 15 p.

    Research output: Contribution to journalArticle

  17. Protecting Wireless Mesh Networks Against Adverse Weather Conditions

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, 2018 10th International Workshop on Resilient Networks Design and Modeling (RNDM). Institute of Electrical and Electronics Engineers Inc., 7 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  18. Massive MIMO Optimization with Compatible Sets

    Emma Fitzgerald, Pióro, M. & Fredrik Tufvesson, 2019 Mar

    Research output: Book/ReportReport

  19. Massive MIMO Optimization with Compatible Sets

    Emma Fitzgerald, Pióro, M. & Fredrik Tufvesson, 2019, In : IEEE Transactions on Wireless Communications. p. 2794 - 2812

    Research output: Contribution to journalArticle

  20. Massive MIMO C-Set Optimisation

    Emma Fitzgerald, 2019

    Research output: Non-textual formSoftware

  21. Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks

    Emma Fitzgerald & Pióro, M., 2019, (Accepted/In press) International Workshop on Resilient Networks Design and Modelling (RNDM). IEEE - Institute of Electrical and Electronics Engineers Inc., 7 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  22. Network Lifetime Maximization in Wireless Mesh Networks for Machine-to-Machine Communication

    Emma Fitzgerald, Pióro, M. & Tomaszewski, A., 2019, In : Ad Hoc Networks. 101987.

    Research output: Contribution to journalArticle

  23. Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol

    Christian Gehrmann, 1994 Aug 21, CRYPTO '94. Desmedt, Y. (ed.). IACR ed. Berlin, Heidelberg: Springer, Vol. 839. p. 121-128 7 p. (Lecture Notes in Computer Science; vol. 839).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  24. Metadata filtering for user-friendly centralized biometric authentication

    Christian Gehrmann, Rodan, M. & Jönsson, N., 2019 Jun 6, In : EURASIP Journal on Information Security. 2019, 1, 17 p., 7.

    Research output: Contribution to journalArticle

  25. Engaging Students using GitHub as a Learning Management System

    Sara Gunnarsson, Larsson, P., Sara Månsson, Erik Mårtensson & Jonathan Sönnerup, 2018 Sep, Lunds universitets pedagogiska utvecklingskonferens 2017. Lund: AHU, Lunds universitet, p. 63-70 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  26. Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems

    Qian Guo, 2016, Department of Electrical and Information Technology, Lund University. 243 p.

    Research output: ThesisDoctoral Thesis (compilation)

  27. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  28. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  29. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, In : IEEE Transactions on Information Theory. 65, 3, p. 1845 - 1861 17 p.

    Research output: Contribution to journalArticle

  30. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Meier, W., Jonathan Sönnerup & Yoshida, H., 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (eds.). Springer Nature Switzerland AG, p. 55-71 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  31. Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study

    Martin Höst, Jonathan Sönnerup, Martin Hell & Olsson, T., 2018, Proceedings of the 2018 International Conference on Software Engineering Research & Practice. p. 61-67

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  32. Modifying Backoff Freezing Mechanism to Optimize Dense IEEE 802.11 Networks

    Karaca, M., Bastani, S. & Björn Landfeldt, 2017, In : IEEE Transactions on Vehicular Technology. 66, 10, p. 9470 - 9482

    Research output: Contribution to journalArticle

  33. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 Feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  34. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 Jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, p. 273-294 22 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  35. A Recommender System for User-Specific Vulnerability Scoring

    Linus Karlsson, Pegah Nikbakht Bideh & Martin Hell, 2019 Aug, (Accepted/In press) CRiSIS 2019. Springer

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  36. Contributions to Preventive Measures in Cyber Security

    Linus Karlsson, 2019 Sep 30, Department of Electrical and Information Technology, Lund University. 205 p.

    Research output: ThesisDoctoral Thesis (compilation)

  37. A Routing Protocol for LoRA Mesh Networks

    Lundell, D., Hedberg, A., Christian Nyberg & Emma Fitzgerald, 2018 Aug 30, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 6 p. 18074086

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  38. The Asymptotic Complexity of Coded-BKW with Sieving Using Increasing Reduction Factors

    Erik Mårtensson, 2019, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., p. 2579-2583 8849218

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  39. Optimizing DRX for Video delivery over LTE: Utilizing Channel Prediction and In-network caching

    Farnaz Moradi, Karaca, M., Emma Fitzgerald, Pioro, M., Ljung, R. & Björn Landfeldt, 2017, 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2017. Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  40. HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components

    Pegah Nikbakht Bideh, Martin Höst & Martin Hell, 2018, Product-Focused Software Process Improvement. Springer, p. 81-97 16 p. ( Lecture Notes in Computer Science; vol. 11271).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  41. Software Defined Networking for Emergency Traffic Management in Smart Cities

    Pegah Nikbakht Bideh, Nicolae Paladi & Martin Hell, 2019 Sep 18, (Accepted/In press) Third International Workshop on Vehicular Adhoc Networks for Smart Cities. Springer, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  42. Sharing of vulnerability information among companies - a survey of Swedish companies

    Olsson, T., Martin Hell, Martin Höst, Franke, U. & Borg, M., 2019 Aug 27, (Accepted/In press) Euromicro Conference on Software Engineering and Advanced Applications (SEAA). p. 284 291 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

Previous 1 2 Next