• Advances in Machine-Learning Based Disaggregation of Building Heating Loads: A Review 

      Lien, Synne Krekling; Najafi, Behzad; Rajasekharan, Jayaprakash (Peer reviewed; Journal article, 2023)
      This review article investigates the methods proposed for disaggregating the space heating units’ load from the aggregate electricity load of commercial and residential buildings. It explores conventional approaches together ...
    • Affordances in Human-Chatbot Interaction: A Review of the Literature. 

      Mygland, Morten Johan; Schibbye, Morten; Pappas, Ilias; Vasilakopoulou, Polyxeni (Peer reviewed; Journal article, 2021)
      The present study advances our understanding of human-AI interactions, by identifying and analyzing chatbot affordances in prior research. The results of this review consolidate research findings on chatbots’ affordances, ...
    • Analysis of uPort Open, an identity management blockchain-based solution 

      Panait, Andreea E.; Olimid-Nencioni, Ruxandra-Florentina; Stefanescu, Alin (Peer reviewed; Journal article, 2020)
      Recently, academics and professionals proposed a substantial number of identity management solutions based on blockchain technology. Among them, uPort appeared promising, being considered for both personal and administrative ...
    • Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing 

      Silde, Tjerand; Strand, Martin (Peer reviewed; Journal article, 2022)
      Anonymous single-use tokens have seen recent applications in private Internet browsing and anonymous statistics collection. We develop new schemes in order to include public metadata such as expiration dates for tokens. ...
    • Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study 

      Amro, Ahmed Walid; Yamin, Muhammad Mudassar; Knox, Benjamin James (Peer reviewed; Journal article, 2020)
      Technology dependent, digitally innate students are joining academia. Consequently, traditional pedagogical techniques for achieving desired learning outcomes are not universally sufficient. Digital clickers were introduced ...
    • Artificial Intelligence Ambidexterity, Adaptive Transformation Capability, and Their Impact on Performance Under Tumultuous Times 

      van de Wetering, Rogier; Mikalef, Patrik; Dennehy, Denis (Peer reviewed; Journal article, 2022)
    • Authenticated Key Exchange and Signatures with Tight Security in the Standard Model 

      Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven (Peer reviewed; Journal article, 2021)
      We construct the first authenticated key exchange protocols that achieve tight security in the standard model. Previous works either relied on techniques that seem to inherently require a random oracle, or achieved only ...
    • Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption 

      Galteland, Yao Jiang; Pan, Jiaxin (Peer reviewed; Journal article, 2023)
      The understanding of directionality for updatable encryption (UE) schemes is important, but not yet completed in the literature. We show that security in the backward-leak uni-directional key updates setting is equivalent ...
    • Big Data Analytics Affordances for Social Innovation: A Theoretical Framework 

      Pappas, Ilias; Thapa, Devinder (Peer reviewed; Journal article, 2021)
      This paper proposes a theoretical framework to identify the mechanisms by which actors perceive the affordances of big data analytics (BDA) and how institutional voids and supports enable or hinder the actualisation of ...
    • A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks 

      Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Boyd, Colin Alexander; Haines, Thomas Edmund (Peer reviewed; Journal article, 2019)
      A Blind Coupon Mechanism (BCM) allows spreading of alerts quietly and quickly over unreliable networks. The BCM primitive ensures that alerts are efficiently broadcast while the nature of these signals are securely hidden. ...
    • Bridging Values: The Inclusion of Young Generations in Computing 

      Szlavi, Anna; Versino, Serena; Zanardi, Irene; Bolesta, Karolina; Jaccheri, Maria Letizia (Journal article, 2023)
      There is a constantly growing need for skilled professionals in the computing field, which poses challenges for finding the right people for the job. According to the 2022 Digital Economy and Society Index, 55% of companies ...
    • Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions 

      Pan, Jiaxin; Wagner, Benedikt (Peer reviewed; Journal article, 2023)
      Multi-signatures have been drawing lots of attention in recent years, due to their applications in cryptocurrencies. Most early constructions require three-round signing, and recent constructions have managed to reduce the ...
    • Cloud-assisted Asynchronous Key Transport with Post-Quantum Security 

      Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao (Peer reviewed; Journal article, 2020)
      In cloud-based outsourced storage systems, many users wish to securely store their files for later retrieval, and additionally to share them with other users. These retrieving users may not be online at the point of the ...
    • Color Calibration on Human Skin Images 

      Amani, Mahdi; Falk, Håvard Hagen; Jensen, Oliver Damsgaard; Vartdal, Gunnar; Aune, Anders; Lindseth, Frank (Journal article; Peer reviewed, 2019)
      Many recent medical developments rely on image analysis, however, it is not convenient nor cost-efficient to use professional image acquisition tools in every clinic or laboratory. Hence, a reliable color calibration is ...
    • Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes 

      Pan, Jiaxin; Zeng, Runzhi (Peer reviewed; Journal article, 2022)
      We propose four public-key encryption schemes with tight simulation-based selective-opening security against chosen-ciphertext attacks (SIM-SO-CCA) in the random oracle model. Our schemes only consist of small constant ...
    • Confirmation sampling for exact nearest neighbor search 

      Christiani, Tobias; Pagh, Rasmus; Thorup, Mikkel (Peer reviewed; Journal article, 2020)
      Locality-sensitive hashing (LSH), introduced by Indyk and Motwani in STOC ’98, has been an extremely influential framework for nearest neighbor search in high-dimensional data sets. While theoretical work has focused on ...
    • Cronus: Everlasting Privacy with Audit and Cast 

      Haines, Thomas Edmund (Journal article; Peer reviewed, 2019)
      We present a new online voting scheme with everlasting privacy and cast-as-intended verifiability. We follow the so called “audit-and-cast” paradigm where the voter audits the ballot before casting it. To mitigate the ...
    • Cryptographic smooth neighbors 

      Bruno, Giacomo; Corte-Real Santos, Maria; Costello, Craig; Eriksen, Jonathan Komada; Meyer, Michael; Naehrig, Michael; Sterner, Bruno (Peer reviewed; Journal article, 2023)
      We revisit the problem of finding two consecutive B-smooth integers by giving an optimised implementation of the Conrey-Holmstrom-McLaughlin “smooth neighbors” algorithm. While this algorithm is not guaranteed to return ...
    • CyberEscape Approach to Advancing Hard and Soft Skills in Cybersecurity Education 

      Pirta-Dreimane, Rūta; Brilingaite, A.; Roponena, Evita; Parish, Karen; Grabis, Janis; Lugo, Ricardo Gregorio; Bonders, Martins (Peer reviewed; Journal article, 2023)
      Incorporating gamification elements and innovative approaches in training and educational programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity training should consider a combination of hard and ...
    • The Data Value Quest: A Holistic Semantic Approach at Bosch 

      Zhou, Baifan; Zheng, Zhuoxun; Zhou, Dongzhuoran; Cheng, Gong; Jimenez-Ruiz, Ernesto; Trung-Kien, Tran; Stepanova, Daria; Gad-Elrab, Mohamed H.; Nikolov, Nikolay; Soylu, Ahmet; Kharlamov, Evgeny (Journal article; Peer reviewed, 2022)
      Modern industry witnesses a fast growth in volume and complexity of heterogeneous manufacturing (big) data [1, 2] thanks to the technological advances of Industry 4.0 [1, 3], including development in perception, communication, ...