• Lightweight structures of big numbers for cryptographic primitives in limited devices 

      Fujdiak, Radek; Mlynek, Petr; Bezzateev, Sergey; Muka, Romina; Slacik, Jan; Misurec, Jiri; Raso, Ondrej (Journal article; Peer reviewed, 2018)
      The new technological approaches bring us into the digital era, where data security is a part of our everyday lives. Nowadays cryptographic algorithms, which are also recommended by international security standards, are ...
    • A LINDDUN-Based Privacy Threat Modelling for National Identification Systems 

      Nweke, Livinus Obiora; Abomhara, Mohamed; Yildirim Yayilgan, Sule; Camparin, Debora; Heurtier, Olivier; Bunney, Calum (Chapter, 2022)
      The international focus on attaining identity for all has fostered advances in technological developments that have given rise to changing demands on the architecture and deployment of national identification (NID) systems. ...
    • Linear Consistency Test (LCT) in cryptanalysis of irregularly clocked LFSRs in the presence of noise 

      Bu, Guro (Master thesis, 2011)
      ENGELSK: Keystream generators using irregular clocking are frequently used to generate the keystream in a stream cipher. These generators are typically composed of two Linear Feedback Shift Registers (LFSRs), where the ...
    • Linearity Measures for Multivariate Public Key Cryptography 

      Samardjiska, Simona; Gligoroski, Danilo (Chapter, 2014)
      We propose a new general framework for the security of Multivariate Quadratic (MQ) public key schemes with respect to attacks that exploit the existence of linear subspaces. We adopt linearity measures that have been used ...
    • Linking QoE and Performance Models for DASH-based Video Streaming 

      Schwarzmann, Susanna; Zinner, Thomas (Chapter, 2020)
      HTTP Adaptive Streaming (HAS) is the de-facto standard for video delivery over the Internet. Splitting the video clip into small segments and providing multiple quality levels per segment allows the client to dynamically ...
    • LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack 

      Kaliyar, Pallavi; Erdodi, Laszlo; Katsikas, Sokratis (Chapter, 2022)
      Recently, the number of Internet of Things (IoT) devices has increased significantly, as they have become affordable to most people. This spread has highlighted a critical security threat, namely the increasing number of ...
    • Live forensics on the Windows 10 secure kernel. 

      Brendmo, Hans Kristian (Master thesis, 2017)
      The thesis looks at the internals of the secure kernel, explores ways of performing live forensics on the secure kernel as well as providing information on how to extract a full memory dump from a virtual machine running ...
    • Liveness Detection for 3D Face Mask Attacks. 

      Katwal,Rupak (Master thesis, 2021)
      The serviceable and convenient nature of the Face Recognition System (FRS) makes it a preferred way for access control and authentication for a wide range of application areas, from biometric passport, surveillance system, ...
    • Local voting protocol step-size choice for consensus achievement 

      Amelin, Konstantin; Amelina, Natalia; Ivanskiy, Yury; Jiang, Yuming (Journal article; Peer reviewed, 2018)
      In the paper, a multi-agent network system of different computing nodes is considered. A problem of load balancing in the network is addressed. The problem is formulated as consensus achievement problem and solved via local ...
    • Local voting: A new distributed bandwidth reservation algorithm for 6TiSCH networks 

      Vergados, Dimitrios; Kralevska, Katina; Jiang, Yuming; Michalas, Angelos (Peer reviewed; Journal article, 2020)
      The IETF 6TiSCH working group fosters the adaptation of IPv6-based protocols into Internet of Things by introducing the 6TiSCH Operation Sublayer (6top). The 6TiSCH architecture integrates the high reliability and low-energy ...
    • Location Disclosure in LTE Networks by using IMSI Catcher 

      Sørseth, Christian (Master thesis, 2017)
      Long-Term Evolution (LTE) is currently being deployed in vast areas of the world and is the latest implemented standard in mobile communication. The standard is considered to have significant improvements compared to its ...
    • Location-Aware Trust and Reputation Management for Online Social Networks 

      Obadya, Mona (Master thesis, 2012)
      The task for this Master thesis is to investigate location-aware trust/reputationmanagement system for online social networks.Social networking Services (SNS) are online platforms for social interactionsover the Internet, ...
    • Long Distance Transport Protocols with High Throughput and Correction Control: eVLBI Transfers over Shared Networks 

      Abrahamsen, Helene Marie (Master thesis, 2007)
      Very Long Baseline Interferometry (VLBI) is a technique for gathering data using telescopes located across the globe. These data are sent to a central correlator for correlation, which produces results giving very accurate ...
    • Long-term Bitcoin Scalability 

      Thorsrud, Erlend Solberg (Master thesis, 2018)
      The interest has grown around Bitcoin as a trustless and decentralized digital payment service. Along with the increase in users and transactions, Bitcoin suffers from challenges regarding scalability. Many solutions have ...
    • Long-Term Confidential Data Storage by Distributed Secret Shares 

      Løland Elle, Merete (Master thesis, 2017)
      There are several mobile password managers on the marked, where the most popular of these uses the classical solution for storage which requires both encryption and backup policies. If quantum computers become a reality, ...
    • Long-term telecommunication forecasting 

      Stordahl, Kjell (Doctoral thesis, 2006)
      The key word for the thesis is long-term demand forecasting which have been applied on telecommunications and especially on broadband accesses and traffic. The objective with the thesis has been to structure and present ...
    • Long-Term Video QoE Assessment Studies: A Systematic Review 

      Cieplínska, Natalia; Janowski, Lucjan; De Moor, Katrien; Wierzchoń, Michał (Peer reviewed; Journal article, 2023)
      Although longitudinal studies are common in other disciplines, such as psychology, medicine, or User Experience, they are rarely used in Quality of Experience (QoE). However, observing users over time can provide useful ...
    • Low complexity subspace approach for unbiased frequency estimation of a complex single-tone 

      Pourafzal, Alireza; Škrabánek, Pavel; Cheffena, Michael; Yildirim, Sule; Roi-Taravella, Thomas (Journal article, 2024)
      We propose a single-tone frequency estimator of a one-dimensional complex signal in complex white Gaussian noise. The estimator is based on the subspace approach and the unitary transformation. Due to its low space and ...
    • Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation 

      Qin, Le; Peng, Fei; Venkatesh, Sushma; Ramachandra, Raghavendra; Long, Min; Busch, Christoph (Journal article; Peer reviewed, 2021)
    • A Low-cost and Accurate Microwave Sensor System for Permittivity Characterization 

      Pourafzal, Alireza; Roi-Taravella, Thomas; Cheffena, Michael; Yildirim Yayilgan, Sule (Peer reviewed; Journal article, 2022)
      A novel low-cost microwave sensor system is proposed for accurate sensing of the real relative permittivity of materials under test (MUT). The proposed solution eliminates the need for using advanced measurement devices ...