Browsing Institutt for informasjonssikkerhet og kommunikasjonsteknologi by Journals "Lecture Notes in Computer Science"
Now showing items 1-20 of 31
-
A Simple Algorithm for Estimating Distribution Parameters from n -Dimensional Randomized Binary Responses
(Journal article; Peer reviewed, 2018)Randomized response is attractive for privacy preserving data collection because the provided privacy can be quantified by means such as differential privacy. However, recovering and analyzing statistics involving multiple ... -
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
(Journal article; Peer reviewed, 2012) -
Anchored kernel hashing for cancelable template protection for cross-spectral periocular data
(Journal article; Peer reviewed, 2019)Periocular characteristics is gaining prominence in biometric systems and surveillance systems that operate either in NIR spectrum or visible spectrum. While the ocular information can be well utilized, there exists a ... -
Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking
(Journal article; Peer reviewed, 2017)The cMix scheme was proposed by Chaum et al. in 2016 as the first practical set of cryptographic protocols that offer sender-recipient unlinkability at scale. The claim was that the cMix is secure unless all nodes collude. ... -
Cognitive Profiles and Education of Female Cyber Defence Operators
(Peer reviewed; Journal article, 2019)Rapid technological developments and definition of the cyber domain as a battlefield has challenged the cognitive attributes of its operators. In order to meet these demands, higher education programs in STEM (science, ... -
Correlating High- and Low-Level Features: Increased Understanding of Malware Classification
(Journal article; Peer reviewed, 2019)Malware brings constant threats to the services and facilities used by modern society. In order to perform and improve anti-malware defense, there is a need for methods that are capable of malware categorization. As malware ... -
Cyber security risk assessment of a DDoS attack
(Journal article; Peer reviewed, 2016)This paper proposes a risk assessment process based on distinct classes and estimators, which we apply to a case study of a common communications security risk; a distributed denial of service attack (DDoS) attack. The ... -
Cyber Weapons Storage Mechanisms
(Journal article; Peer reviewed, 2019)In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ... -
Describing Component Collaboration Using Goal Sequences
(Journal article; Peer reviewed, 2008)Services are normally not performed by a single component, but result from the collaboration of several distributed components. Their precise specification and validation require complex models, where the intention of the ... -
Easy 4G/LTE IMSI Catchers for Non-Programmers
(Journal article; Peer reviewed, 2017)IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators. ... -
Editorial Image Retrieval using Handcrafted and CNN Features
(Journal article; Peer reviewed, 2018)Textual keywords have been used in the early stages for image retrieval systems. Due to the huge increase of image content, an image is efficiently used instead according to the time computation. Deciding powerful feature ... -
Enhancing Usage Control for Performance: An Architecture for Systems of Systems
(Journal article; Peer reviewed, 2019)The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and ... -
GIF Image Retrieval in Cloud Computing Environment
(Journal article; Peer reviewed, 2018)GIF images have been used in the last years, especially on social media. Here it is explored a content-based image retrieval system to work specifically with GIF file format. Its implementation is extended to a cloud ... -
Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces
(Journal article; Peer reviewed, 2018)Traditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service ... -
Key recovery: Inert and public
(Journal article; Peer reviewed, 2017)We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and ... -
Managing private credentials by privacy-preserving biometrics
(Journal article; Peer reviewed, 2018)We investigate in this paper the need to managing a user’s private credentials using privacy-preserving biometrics, define several private credential management work models under different trust models between a user and ... -
Mobile-Based Painting Photo Retrieval using Combined Features
(Journal article; Peer reviewed, 2018)In paintings or artworks, sharing a photo of a painting using mobile phone is simple and fast. However, searching for information about specific captured photo of an unknown painting takes time and is not easy. No previous ... -
Offline Assisted Group Key Exchange
(Journal article; Peer reviewed, 2018)We design a group key exchange protocol with forward secrecy where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offline, ... -
One click privacy for online social networks
(Journal article; Peer reviewed, 2017)We present an approach to reduce the complexity of adjusting privacy preferences for multiple online social networks. To achieve this, we quantify the effect on privacy for choices that users make, and simplify configuration ... -
Pi-Cipher: Authenticated Encryption for Big Data
(Chapter, 2014)In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, ...