Nätverk och säkerhet

Organisation: forskargrupp

Fler filtreringsmöjligheter
  1. 2019
  2. Contributions to Preventive Measures in Cyber Security

    Linus Karlsson, 2019 sep 30, Department of Electrical and Information Technology, Lund University. 205 s.

    Forskningsoutput: AvhandlingDoktorsavhandling (sammanläggning)

  3. Software Defined Networking for Emergency Traffic Management in Smart Cities

    Pegah Nikbakht Bideh, Nicolae Paladi & Martin Hell, 2019 sep 18, (Accepted/In press) Third International Workshop on Vehicular Adhoc Networks for Smart Cities. Springer, 12 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  4. Sharing of vulnerability information among companies - a survey of Swedish companies

    Olsson, T., Martin Hell, Martin Höst, Franke, U. & Borg, M., 2019 aug 27, (Accepted/In press) Euromicro Conference on Software Engineering and Advanced Applications (SEAA). s. 284 291 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  5. Protecting OpenFlow Flow Tables with Intel SGX

    Nicolae Paladi, Svenningsson, J., Medina, J. & Arlos, P., 2019 aug 23, ACM SIGCOMM 2019 Conference on Posters and Demos . ACM, s. 146-147

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  6. A Recommender System for User-Specific Vulnerability Scoring

    Linus Karlsson, Pegah Nikbakht Bideh & Martin Hell, 2019 aug, (Accepted/In press) CRiSIS 2019. Springer

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  7. On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving

    Qian Guo, Thomas Johansson, Erik Mårtensson & Paul Stankovski, 2019 aug, I : IEEE Transactions on Information Theory. 65, 8, s. 5243-5259 16 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  8. Metadata filtering for user-friendly centralized biometric authentication

    Christian Gehrmann, Rodan, M. & Jönsson, N., 2019 jun 6, I : EURASIP Journal on Information Security. 2019, 1, 17 s., 7.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  9. Massive MIMO Optimization with Compatible Sets

    Emma Fitzgerald, Pióro, M. & Fredrik Tufvesson, 2019 mar

    Forskningsoutput: Bok/rapportRapport

  10. A Key Recovery Reaction Attack on QC-MDPC

    Qian Guo, Thomas Johansson & Paul Stankovski Wagner, 2019, I : IEEE Transactions on Information Theory. 65, 3, s. 1845 - 1861 17 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  11. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Meier, W., Jonathan Sönnerup & Yoshida, H., 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (red.). Springer Nature Switzerland AG, s. 55-71 17 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  12. A new birthday-type algorithm for attacking the fresh re-keying countermeasure

    Qian Guo & Thomas Johansson, 2019, I : Information Processing Letters. 146, s. 30-34 5 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  13. Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

    D'Anvers, J., Qian Guo, Thomas Johansson, Alexander Nilsson, Vercauteren, F. & Verbauwhede, I., 2019, Public-Key Cryptography – PKC 2019. Springer, s. 565-598 (Lecture Notes in Computer Science; vol. 11443).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

  14. Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks

    Emma Fitzgerald & Pióro, M., 2019, (Accepted/In press) International Workshop on Resilient Networks Design and Modelling (RNDM). IEEE--Institute of Electrical and Electronics Engineers Inc., 7 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  15. Guarding the Guards: Accountable Authorities in VANETs

    Joakim Brorsson, Paul Stankovski & Martin Hell, 2019, 2018 IEEE Vehicular Networking Conference (VNC). 4 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  16. Improved Decoders for p-ary MDPC

    Canales-Martinez, I., Qian Guo & Thomas Johansson, 2019. 11 s.

    Forskningsoutput: KonferensbidragKonferenspaper, ej i proceeding/ej förlagsutgivet

  17. Massive MIMO C-Set Optimisation

    Emma Fitzgerald, 2019

    Forskningsoutput: Icke-textbaserad outputMjukvara

  18. Massive MIMO Optimization with Compatible Sets

    Emma Fitzgerald, Pióro, M. & Fredrik Tufvesson, 2019, I : IEEE Transactions on Wireless Communications. s. 2794 - 2812

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  19. Network Lifetime Maximization in Wireless Mesh Networks for Machine-to-Machine Communication

    Emma Fitzgerald, Pióro, M. & Tomaszewski, A., 2019, I : Ad Hoc Networks. 101987.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  20. SDN Access Control for the Masses

    Nicolae Paladi & Christian Gehrmann, 2019, I : Computers and Security. 80, s. 155-172 18 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  21. The Asymptotic Complexity of Coded-BKW with Sieving Using Increasing Reduction Factors

    Erik Mårtensson, 2019, IEEE International Symposium on Information Theory (ISIT). IEEE--Institute of Electrical and Electronics Engineers Inc.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  22. 2018
  23. Error Amplification in Code-based Cryptography

    Alexander Nilsson, Thomas Johansson & Paul Stankovski, 2018 nov 12, I : IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2019, 1, s. 238-258

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  24. Engaging Students using GitHub as a Learning Management System

    Sara Gunnarsson, Larsson, P., Sara Månsson, Erik Mårtensson & Jonathan Sönnerup, 2018 sep, Lunds universitets pedagogiska utvecklingskonferens 2017. Lund: AHU, Lunds universitet, s. 63-70 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  25. A Routing Protocol for LoRA Mesh Networks

    Lundell, D., Hedberg, A., Christian Nyberg & Emma Fitzgerald, 2018 aug 30, 2018 IEEE 19th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 6 s. 18074086

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  26. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

    Deneuville, J. C., Gaborit, P., Qian Guo & Thomas Johansson, 2018 aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. s. 1450-1454 5 s. 8437940

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  27. Trust Anchors in Software Defined Networks

    Nicolae Paladi, Linus Karlsson & Elbashir, K., 2018 aug 7, 23rd European Symposium on Research in Computer Security, ESORICS 2018. Springer, Vol. 11099. s. 485-505 20 s. (Lecture Notes in Computer Science; vol. 11009).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  28. Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions

    Pióro, M., Tomaszewski, A. & Capone, A., 2018 aug 1, I : Ad Hoc Networks. 77, s. 119-142 24 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  29. Path Generation for Affine Flow Thinning

    Pióro, M., Kalesnikau, I. & Poss, M., 2018 feb 1, I : Electronic Notes in Discrete Mathematics. 64, s. 355-364 10 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  30. Social Norms and the Dominance of Low-Doers

    Carlo Proietti & Antonio Franco, 2018 jan 31, I : Journal of Artificial Societies and Social Simulation. 21, 1, 6.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  31. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, s. 273-294 22 s. (Communications in Computer and Information Science; vol. 867).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  32. Energy-Optimal Data Aggregation and Dissemination for the Internet of Things

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, I : IEEE Internet of Things Journal. 5, 2, s. 955-969 15 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  33. Evaluating Security of Software Through Vulnerability Metrics

    Jonathan Sönnerup & Martin Hell, 2018, Proceedings of the 2018 International Conference on Security & Management. s. 79 85 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  34. HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components

    Pegah Nikbakht Bideh, Martin Höst & Martin Hell, 2018, Product-Focused Software Process Improvement. Springer, s. 81-97 16 s. ( Lecture Notes in Computer Science; vol. 11271).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  35. Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

    Cobleigh, A., Martin Hell, Linus Karlsson, Reimer, O., Jonathan Sönnerup & Wisenhoff, D., 2018, IEEE 22nd International Enterprise Distributed Object Computing Workshop. IEEE--Institute of Electrical and Electronics Engineers Inc., 4 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  36. Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study

    Martin Höst, Jonathan Sönnerup, Martin Hell & Olsson, T., 2018, Proceedings of the 2018 International Conference on Software Engineering Research & Practice. s. 61-67

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  37. Practical Attacks on Relational Databases Protected via Searchable Encryption

    Abdelraheem, M. A., Andersson, T., Christian Gehrmann & Glackin, C., 2018, Information Security - 21st International Conference, ISC 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (red.). Springer, s. 171-191 21 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11060 LNCS).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  38. Protecting Wireless Mesh Networks Against Adverse Weather Conditions

    Emma Fitzgerald, Pioro, M. & Tomaszewski, A., 2018, 2018 10th International Workshop on Resilient Networks Design and Modeling (RNDM). Institute of Electrical and Electronics Engineers Inc., 7 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  39. 2017
  40. Improving Throughput and Minimizing Age of Information in dense WLANs, Using Cooperative Techniques

    Antonio Franco, 2017 dec, Lund. 108 s.

    Forskningsoutput: AvhandlingLicentiatavhandling

  41. An optimization model for affine flow thinning - A traffic protection mechanism for FSO networks

    Pioro, M., Kalesnikau, I. & Poss, M., 2017 okt 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093015

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  42. On robust FSO network dimensioning

    D'Andreagiovanni, F., Nace, D., Pioro, M., Foss, M., Shehaj, M. & Tomaszewski, A., 2017 okt 31, Proceedings of 2017 9th International Workshop on Resilient Networks Design and Modeling, RNDM 2017. Institute of Electrical and Electronics Engineers Inc., 8093027

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  43. An Online Placement Mechanism for Efficient Delivery of User Generated Content

    Mohammadhassan Safavi, Bastani, S. & Björn Landfeldt, 2017 sep 14, IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2017 . Institute of Electrical and Electronics Engineers Inc., 7 s. (IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  44. Trust but Verify: Trust Establishment Mechanisms in Infrastructure Clouds

    Nicolae Paladi, 2017 sep 4, 1 uppl. Lund: The Department of Electrical and Information Technology. 224 s.

    Forskningsoutput: AvhandlingDoktorsavhandling (sammanläggning)

  45. Dynamic Fault-Tolerance and Mobility Provisioning for Services on Mobile Cloud Platforms

    Stahl, P., Broberg, J. & Björn Landfeldt, 2017 jun 8, Proceedings - 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2017. Institute of Electrical and Electronics Engineers Inc., s. 131-138 8 s. 7944883

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  46. OpenSAW: Open Security Analysis Workbench

    Ben Henda, N., Johansson, B., Lantz, P., Norrman, K., Saaranen, P. & Segersvärd, O., 2017 apr 22, Fundamental Approaches to Software Engineering: 20th International Conference, FASE 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Huisman, M. & Rubin, J. (red.). 1 uppl. Berlin Heidelberg: Springer, Vol. 10202. s. 321-337 16 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  47. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. s. 225-232 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  48. Standard-compliant LTE-A Uplink Scheduling Scheme with Quality of Service

    Ragaleux, A., Baey, S. & Karaca, M., 2017 jan 17, I : IEEE Transactions on Vehicular Technology. s. 7207 - 7222

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  49. Searchable Encrypted Relational Databases: Risks and Countermeasures

    Abdelraheem, M. A., Andersson, T. & Christian Gehrmann, 2017 jan 10, Cryptology ePrint Archive, 2017, 24, s. 1-20 20 s.

    Forskningsoutput: Bidrag till övrig tidskrift/dags- eller nyhetstidningArtikel i facktidskrift eller populärpress

  50. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 jan, I : Designs, Codes, and Cryptography. 82, 1, s. 1-2 2 s.

    Forskningsoutput: TidskriftsbidragDebate/Note/Editorial

Föregående 1 2 Nästa