Networks and Security

Organisational unit: Research group

More filtering options
  1. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, In : IEEE Transactions on Information Theory. 65, 3, p. 1845 - 1861 17 p.

    Research output: Contribution to journalArticle

  2. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Meier, W., Jonathan Sönnerup & Yoshida, H., 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (eds.). Springer Nature Switzerland AG, p. 55-71 17 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. An Online Placement Mechanism for Efficient Delivery of User Generated Content

    Mohammadhassan Safavi, Bastani, S. & Björn Landfeldt, 2017 Sep 14, IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2017 . Institute of Electrical and Electronics Engineers Inc., 7 p. (IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. An optimization model for affine flow thinning - A traffic protection mechanism for FSO networks

    Pioro, M., Kalesnikau, I. & Poss, M., 2017 Oct 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093015

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. A Recommender System for User-Specific Vulnerability Scoring

    Linus Karlsson, Pegah Nikbakht Bideh & Martin Hell, 2019 Aug, (Accepted/In press) CRiSIS 2019. Springer

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  7. A Routing Protocol for LoRA Mesh Networks

    Lundell, D., Hedberg, A., Christian Nyberg & Emma Fitzgerald, 2018 Aug 30, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 6 p. 18074086

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. Autonomy in PhD-education – Supervising for Independence

    Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson, 2016 Dec 15, LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, p. 9-13 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  9. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  10. Contributions to Preventive Measures in Cyber Security

    Linus Karlsson, 2019 Sep 30, Department of Electrical and Information Technology, Lund University. 205 p.

    Research output: ThesisDoctoral Thesis (compilation)

  11. Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol

    Christian Gehrmann, 1994 Aug 21, CRYPTO '94. Desmedt, Y. (ed.). IACR ed. Berlin, Heidelberg: Springer, Vol. 839. p. 121-128 7 p. (Lecture Notes in Computer Science; vol. 839).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  12. Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    D'Anvers, J., Qian Guo, Thomas Johansson, Alexander Nilsson, Vercauteren, F. & Verbauwhede, I., 2019, Public-Key Cryptography – PKC 2019. Springer, p. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  13. Dynamic Fault-Tolerance and Mobility Provisioning for Services on Mobile Cloud Platforms

    Stahl, P., Broberg, J. & Björn Landfeldt, 2017 Jun 8, Proceedings - 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2017. Institute of Electrical and Electronics Engineers Inc., p. 131-138 8 p. 7944883

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. Dynamic Server Provisioning with Queue Stabilization in Data Centres

    Mohammadhassan Safavi, Karaca, M., Bastani, S. & Björn Landfeldt, 2017, IEEE International Conference on Cloud Networking. IEEE - Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  15. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 Jan, In : Designs, Codes, and Cryptography. 82, 1, p. 1-2 2 p.

    Research output: Contribution to journalDebate/Note/Editorial

  16. Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks

    Emma Fitzgerald & Pióro, M., 2019, (Accepted/In press) International Workshop on Resilient Networks Design and Modelling (RNDM). IEEE - Institute of Electrical and Electronics Engineers Inc., 7 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  17. Energy-Optimal Data Aggregation and Dissemination for the Internet of Things

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, In : IEEE Internet of Things Journal. 5, 2, p. 955-969 15 p.

    Research output: Contribution to journalArticle

  18. Engaging Students using GitHub as a Learning Management System

    Sara Gunnarsson, Larsson, P., Sara Månsson, Erik Mårtensson & Jonathan Sönnerup, 2018 Sep, Lunds universitets pedagogiska utvecklingskonferens 2017. Lund: AHU, Lunds universitet, p. 63-70 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  19. Evaluating Security of Software Through Vulnerability Metrics

    Jonathan Sönnerup & Martin Hell, 2018, Proceedings of the 2018 International Conference on Security & Management. p. 79 85 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  20. Guarding the Guards: Accountable Authorities in VANETs

    Joakim Brorsson, Paul Stankovski & Martin Hell, 2019, 2018 IEEE Vehicular Networking Conference (VNC). 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  21. HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components

    Pegah Nikbakht Bideh, Martin Höst & Martin Hell, 2018, Product-Focused Software Process Improvement. Springer, p. 81-97 16 p. ( Lecture Notes in Computer Science; vol. 11271).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  22. Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

    Cobleigh, A., Martin Hell, Linus Karlsson, Reimer, O., Jonathan Sönnerup & Wisenhoff, D., 2018, IEEE 22nd International Enterprise Distributed Object Computing Workshop. IEEE - Institute of Electrical and Electronics Engineers Inc., 4 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  23. Improved Decoders for p-ary MDPC

    Canales-Martinez, I., Qian Guo & Thomas Johansson, 2019. 11 p.

    Research output: Contribution to conferencePaper, not in proceeding

  24. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 Feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  25. Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study

    Martin Höst, Jonathan Sönnerup, Martin Hell & Olsson, T., 2018, Proceedings of the 2018 International Conference on Software Engineering Research & Practice. p. 61-67

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  26. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE - Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  27. Massive MIMO C-Set Optimisation

    Emma Fitzgerald, 2019

    Research output: Non-textual formSoftware

  28. Massive MIMO Optimization with Compatible Sets

    Emma Fitzgerald, Pióro, M. & Fredrik Tufvesson, 2019 Mar

    Research output: Book/ReportReport

  29. Massive MIMO Optimization with Compatible Sets

    Emma Fitzgerald, Pióro, M. & Fredrik Tufvesson, 2019, In : IEEE Transactions on Wireless Communications. p. 2794 - 2812

    Research output: Contribution to journalArticle

  30. Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions

    Pióro, M., Tomaszewski, A. & Capone, A., 2018 Aug 1, In : Ad Hoc Networks. 77, p. 119-142 24 p.

    Research output: Contribution to journalArticle

  31. Metadata filtering for user-friendly centralized biometric authentication

    Christian Gehrmann, Rodan, M. & Jönsson, N., 2019 Jun 6, In : EURASIP Journal on Information Security. 2019, 1, 17 p., 7.

    Research output: Contribution to journalArticle

  32. Modifying Backoff Freezing Mechanism to Optimize Dense IEEE 802.11 Networks

    Karaca, M., Bastani, S. & Björn Landfeldt, 2017, In : IEEE Transactions on Vehicular Technology. 66, 10, p. 9470 - 9482

    Research output: Contribution to journalArticle

  33. Network Lifetime Maximization in Wireless Mesh Networks for Machine-to-Machine Communication

    Emma Fitzgerald, Pióro, M. & Tomaszewski, A., 2019, In : Ad Hoc Networks. 101987.

    Research output: Contribution to journalArticle

  34. Network optimization techniques

    Pioro, M., 2011, Mathematical Foundations for Signal Processing, Communications, and Networking. Serpedin, E., Chen, T. & Rajan, D. (eds.). CRC Press, p. 627-690

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  35. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 Jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, p. 273-294 22 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  36. On robust FSO network dimensioning

    D'Andreagiovanni, F., Nace, D., Pioro, M., Foss, M., Shehaj, M. & Tomaszewski, A., 2017 Oct 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093027

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  37. OpenSAW: Open Security Analysis Workbench

    Ben Henda, N., Johansson, B., Lantz, P., Norrman, K., Saaranen, P. & Segersvärd, O., 2017 Apr 22, Fundamental Approaches to Software Engineering: 20th International Conference, FASE 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Huisman, M. & Rubin, J. (eds.). 1 ed. Berlin Heidelberg: Springer, Vol. 10202. p. 321-337 16 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  38. Optimizing DRX for Video delivery over LTE: Utilizing Channel Prediction and In-network caching

    Farnaz Moradi, Karaca, M., Emma Fitzgerald, Pioro, M., Ljung, R. & Björn Landfeldt, 2017, 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2017. Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  39. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Deneuville, J. C., Gaborit, P., Qian Guo & Thomas Johansson, 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 1450-1454 5 p. 8437940

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  40. Packet routing and frame length optimization in wireless mesh networks with multicast communications

    Tomaszewski, A. & Pioro, M., 2016 Nov 21, 2016 17th International Telecommunications Network Strategy and Planning Symposium, Networks 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 6 p. 7751144

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  41. Path Generation for Affine Flow Thinning

    Pióro, M., Kalesnikau, I. & Poss, M., 2018 Feb 1, In : Electronic Notes in Discrete Mathematics. 64, p. 355-364 10 p.

    Research output: Contribution to journalArticle

  42. Practical Attacks on Relational Databases Protected via Searchable Encryption

    Abdelraheem, M. A., Andersson, T., Christian Gehrmann & Glackin, C., 2018, Information Security - 21st International Conference, ISC 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Springer, p. 171-191 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11060 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  43. Protecting OpenFlow Flow Tables with Intel SGX

    Nicolae Paladi, Svenningsson, J., Medina, J. & Arlos, P., 2019 Aug 23, ACM SIGCOMM 2019 Conference on Posters and Demos . ACM, p. 146-147

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

Previous 1 2 Next