Networks and Security

Organisational unit: Research group

More filtering options
  1. 1994
  2. Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol

    Christian Gehrmann, 1994 Aug 21, CRYPTO '94. Desmedt, Y. (ed.). IACR ed. Berlin, Heidelberg: Springer, Vol. 839. p. 121-128 7 p. (Lecture Notes in Computer Science; vol. 839).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. 2011
  4. Network optimization techniques

    Pioro, M., 2011, Mathematical Foundations for Signal Processing, Communications, and Networking. Serpedin, E., Chen, T. & Rajan, D. (eds.). CRC Press, p. 627-690

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  5. 2016
  6. Scheduling library

    Emma Fitzgerald, 2016

    Research output: Non-textual formSoftware

  7. The Effect of Hidden Terminal Interference on Safety-Critical Traffic in Vehicular Ad Hoc Networks

    Bastani, S. & Björn Landfeldt, 2016, Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '16). ACM, NY, USA, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems

    Qian Guo, 2016, Department of Electrical and Information Technology, Lund University. 243 p.

    Research output: ThesisDoctoral Thesis (compilation)

  9. Packet routing and frame length optimization in wireless mesh networks with multicast communications

    Tomaszewski, A. & Pioro, M., 2016 Nov 21, 2016 17th International Telecommunications Network Strategy and Planning Symposium, Networks 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 6 p. 7751144

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  10. Autonomy in PhD-education – Supervising for Independence

    Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson, 2016 Dec 15, LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, p. 9-13 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. 2017
  12. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  13. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. Dynamic Server Provisioning with Queue Stabilization in Data Centres

    Mohammadhassan Safavi, Karaca, M., Bastani, S. & Björn Landfeldt, 2017, IEEE International Conference on Cloud Networking. IEEE--Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  15. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  16. Modifying Backoff Freezing Mechanism to Optimize Dense IEEE 802.11 Networks

    Karaca, M., Bastani, S. & Björn Landfeldt, 2017, In : IEEE Transactions on Vehicular Technology. 66, 10, p. 9470 - 9482

    Research output: Contribution to journalArticle

  17. Optimizing DRX for Video delivery over LTE: Utilizing Channel Prediction and In-network caching

    Farnaz Moradi, Karaca, M., Emma Fitzgerald, Pioro, M., Ljung, R. & Björn Landfeldt, 2017, 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2017. Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  18. Wireless network generator

    Emma Fitzgerald, 2017

    Research output: Non-textual formSoftware

  19. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 Jan, In : Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.

    Research output: Contribution to journalDebate/Note/Editorial

  20. Searchable Encrypted Relational Databases: Risks and Countermeasures

    Abdelraheem, M. A., Andersson, T. & Christian Gehrmann, 2017 Jan 10, Cryptology ePrint Archive, 2017, 24, p. 1-20 20 p.

    Research output: Contribution to specialist publication or newspaperSpecialist publication article

  21. Standard-compliant LTE-A Uplink Scheduling Scheme with Quality of Service

    Ragaleux, A., Baey, S. & Karaca, M., 2017 Jan 17, In : IEEE Transactions on Vehicular Technology. p. 7207 - 7222

    Research output: Contribution to journalArticle

  22. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 Feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  23. OpenSAW: Open Security Analysis Workbench

    Ben Henda, N., Johansson, B., Lantz, P., Norrman, K., Saaranen, P. & Segersvärd, O., 2017 Apr 22, Fundamental Approaches to Software Engineering: 20th International Conference, FASE 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Huisman, M. & Rubin, J. (eds.). 1 ed. Berlin Heidelberg: Springer, Vol. 10202. p. 321-337 16 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  24. Dynamic Fault-Tolerance and Mobility Provisioning for Services on Mobile Cloud Platforms

    Stahl, P., Broberg, J. & Björn Landfeldt, 2017 Jun 8, Proceedings - 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2017. Institute of Electrical and Electronics Engineers Inc., p. 131-138 8 p. 7944883

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  25. Trust but Verify: Trust Establishment Mechanisms in Infrastructure Clouds

    Nicolae Paladi, 2017 Sep 4, 1 ed. Lund: The Department of Electrical and Information Technology. 224 p.

    Research output: ThesisDoctoral Thesis (compilation)

  26. An Online Placement Mechanism for Efficient Delivery of User Generated Content

    Mohammadhassan Safavi, Bastani, S. & Björn Landfeldt, 2017 Sep 14, IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2017 . Institute of Electrical and Electronics Engineers Inc., 7 p. (IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  27. An optimization model for affine flow thinning - A traffic protection mechanism for FSO networks

    Pioro, M., Kalesnikau, I. & Poss, M., 2017 Oct 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093015

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  28. On robust FSO network dimensioning

    D'Andreagiovanni, F., Nace, D., Pioro, M., Foss, M., Shehaj, M. & Tomaszewski, A., 2017 Oct 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093027

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  29. 2018
  30. Energy-Optimal Data Aggregation and Dissemination for the Internet of Things

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, In : IEEE Internet of Things Journal. 5, 2, p. 955-969 15 p.

    Research output: Contribution to journalArticle

  31. Evaluating Security of Software Through Vulnerability Metrics

    Jonathan Sönnerup & Martin Hell, 2018, Proceedings of the 2018 International Conference on Security & Management. p. 79 85 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  32. HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components

    Pegah Nikbakht Bideh, Martin Höst & Martin Hell, 2018, Product-Focused Software Process Improvement. Springer, p. 81-97 16 p. ( Lecture Notes in Computer Science; vol. 11271).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  33. Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

    Cobleigh, A., Martin Hell, Linus Karlsson, Reimer, O., Jonathan Sönnerup & Wisenhoff, D., 2018, IEEE 22nd International Enterprise Distributed Object Computing Workshop. IEEE--Institute of Electrical and Electronics Engineers Inc., 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  34. Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study

    Martin Höst, Jonathan Sönnerup, Martin Hell & Olsson, T., 2018, Proceedings of the 2018 International Conference on Software Engineering Research & Practice. p. 61-67

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  35. Practical Attacks on Relational Databases Protected via Searchable Encryption

    Abdelraheem, M. A., Andersson, T., Christian Gehrmann & Glackin, C., 2018, Information Security - 21st International Conference, ISC 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Springer, p. 171-191 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11060 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  36. Protecting Wireless Mesh Networks Against Adverse Weather Conditions

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, 2018 10th International Workshop on Resilient Networks Design and Modeling (RNDM). Institute of Electrical and Electronics Engineers Inc., 7 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  37. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 Jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, p. 273-294 22 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  38. Social Norms and the Dominance of Low-Doers

    Carlo Proietti & Antonio Franco, 2018 Jan 31, In : Journal of Artificial Societies and Social Simulation. 21, 1, 6.

    Research output: Contribution to journalArticle

  39. Path Generation for Affine Flow Thinning

    Pióro, M., Kalesnikau, I. & Poss, M., 2018 Feb 1, In : Electronic Notes in Discrete Mathematics. 64, p. 355-364 10 p.

    Research output: Contribution to journalArticle

  40. Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions

    Pióro, M., Tomaszewski, A. & Capone, A., 2018 Aug 1, In : Ad Hoc Networks. 77, p. 119-142 24 p.

    Research output: Contribution to journalArticle

  41. Trust Anchors in Software Defined Networks

    Nicolae Paladi, Linus Karlsson & Elbashir, K., 2018 Aug 7, 23rd European Symposium on Research in Computer Security, ESORICS 2018. Springer, Vol. 11099. p. 485-505 20 p. (Lecture Notes in Computer Science; vol. 11009).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  42. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Deneuville, J. C., Gaborit, P., Qian Guo & Thomas Johansson, 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 1450-1454 5 p. 8437940

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  43. A Routing Protocol for LoRA Mesh Networks

    Lundell, D., Hedberg, A., Christian Nyberg & Emma Fitzgerald, 2018 Aug 30, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 6 p. 18074086

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  44. Engaging Students using GitHub as a Learning Management System

    Sara Gunnarsson, Larsson, P., Sara Månsson, Erik Mårtensson & Jonathan Sönnerup, 2018 Sep, Lunds universitets pedagogiska utvecklingskonferens 2017. Lund: AHU, Lunds universitet, p. 63-70 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  45. 2019
  46. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, In : IEEE Transactions on Information Theory. 65, 3, p. 1845 - 1861 17 p.

    Research output: Contribution to journalArticle

  47. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Meier, W., Jonathan Sönnerup & Yoshida, H., 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (eds.). Springer Nature Switzerland AG, p. 55-71 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  48. Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    D'Anvers, J., Qian Guo, Thomas Johansson, Alexander Nilsson, Vercauteren, F. & Verbauwhede, I., 2019, Public-Key Cryptography – PKC 2019. Springer, p. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  49. Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks

    Emma Fitzgerald & Pióro, M., 2019, (Accepted/In press) International Workshop on Resilient Networks Design and Modelling (RNDM). IEEE--Institute of Electrical and Electronics Engineers Inc., 7 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  50. Energy versus Traffic Optimisation for Machine-to-Machine Communication

    Emma Fitzgerald, Pióro, M. & Tomaszewski, A., 2019, (Accepted/In press) International Conference on Computing, Networking and Communications (ICNC). IEEE--Institute of Electrical and Electronics Engineers Inc., 7 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

Previous 1 2 Next