Networks and Security

Organisational unit: Research group

More filtering options
  1. 2017
  2. A reaction attack on the QC-LDPC mceliece cryptosystem

    Fabšič, T., Hromada, V., Paul Stankovski, Zajac, P., Qian Guo & Thomas Johansson, 2017, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Proceedings. Springer, Vol. 10346 LNCS. p. 51-68 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10346 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  3. Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 323-346 (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  4. Dynamic Server Provisioning with Queue Stabilization in Data Centres

    Mohammadhassan Safavi, Karaca, M., Bastani, S. & Björn Landfeldt, 2017, IEEE International Conference on Cloud Networking. IEEE--Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. Information Set Decoding with Soft Information and some cryptographic applications

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2017, IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc., p. 1793-1797

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  6. Modifying Backoff Freezing Mechanism to Optimize Dense IEEE 802.11 Networks

    Karaca, M., Bastani, S. & Björn Landfeldt, 2017, In : IEEE Transactions on Vehicular Technology. 66, 10, p. 9470 - 9482

    Research output: Contribution to journalArticle

  7. Optimizing DRX for Video delivery over LTE: Utilizing Channel Prediction and In-network caching

    Farnaz Moradi, Karaca, M., Emma Fitzgerald, Pioro, M., Ljung, R. & Björn Landfeldt, 2017, 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2017. Institute of Electrical and Electronics Engineers Inc.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. Wireless network generator

    Emma Fitzgerald, 2017

    Research output: Non-textual formSoftware

  9. 2016
  10. Autonomy in PhD-education – Supervising for Independence

    Mattias Borg, Fredrik Kopsch, Torgny Roxå, Paul Stankovski & Johannes Svensson, 2016 Dec 15, LTHs 9:e Pedagogiska Inspirationskonferens. Andersson, R. & Tempte, L. (eds.). LTH, Lund University, p. 9-13 5 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  11. Packet routing and frame length optimization in wireless mesh networks with multicast communications

    Tomaszewski, A. & Pioro, M., 2016 Nov 21, 2016 17th International Telecommunications Network Strategy and Planning Symposium, Networks 2016 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 6 p. 7751144

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  12. Scheduling library

    Emma Fitzgerald, 2016

    Research output: Non-textual formSoftware

  13. The Effect of Hidden Terminal Interference on Safety-Critical Traffic in Vehicular Ad Hoc Networks

    Bastani, S. & Björn Landfeldt, 2016, Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '16). ACM, NY, USA, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems

    Qian Guo, 2016, Department of Electrical and Information Technology, Lund University. 243 p.

    Research output: ThesisDoctoral Thesis (compilation)

  15. 2011
  16. Network optimization techniques

    Pioro, M., 2011, Mathematical Foundations for Signal Processing, Communications, and Networking. Serpedin, E., Chen, T. & Rajan, D. (eds.). CRC Press, p. 627-690

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  17. 1994
  18. Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol

    Christian Gehrmann, 1994 Aug 21, CRYPTO '94. Desmedt, Y. (ed.). IACR ed. Berlin, Heidelberg: Springer, Vol. 839. p. 121-128 7 p. (Lecture Notes in Computer Science; vol. 839).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

Previous 1 2 Next