• A Simple Algorithm for Estimating Distribution Parameters from n -Dimensional Randomized Binary Responses 

      Vinterbo, Staal (Journal article; Peer reviewed, 2018)
      Randomized response is attractive for privacy preserving data collection because the provided privacy can be quantified by means such as differential privacy. However, recovering and analyzing statistics involving multiple ...
    • A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols 

      Tsay, Joe-Kai; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2012)
    • Anchored kernel hashing for cancelable template protection for cross-spectral periocular data 

      Bylappa Raja, Kiran; Ramachandra, Raghavendra; Busch, Christoph (Journal article; Peer reviewed, 2019)
      Periocular characteristics is gaining prominence in biometric systems and surveillance systems that operate either in NIR spectrum or visible spectrum. While the ocular information can be well utilized, there exists a ...
    • Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking 

      Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
      The cMix scheme was proposed by Chaum et al. in 2016 as the first practical set of cryptographic protocols that offer sender-recipient unlinkability at scale. The claim was that the cMix is secure unless all nodes collude. ...
    • Cognitive Profiles and Education of Female Cyber Defence Operators 

      Lugo, Ricardo Gregorio; Firth-Clark, Andrea; Knox, Benjamin James; Jøsok, Øyvind; Helkala, Kirsi Marjaana; Sütterlin, Stefan (Peer reviewed; Journal article, 2019)
      Rapid technological developments and definition of the cyber domain as a battlefield has challenged the cognitive attributes of its operators. In order to meet these demands, higher education programs in STEM (science, ...
    • Correlating High- and Low-Level Features: Increased Understanding of Malware Classification 

      Banin, Sergii; Dyrkolbotn, Geir Olav (Journal article; Peer reviewed, 2019)
      Malware brings constant threats to the services and facilities used by modern society. In order to perform and improve anti-malware defense, there is a need for methods that are capable of malware categorization. As malware ...
    • Cyber security risk assessment of a DDoS attack 

      Wangen, Gaute; Shalaginov, Andrii; Hallstensen, Christoffer V (Journal article; Peer reviewed, 2016)
      This paper proposes a risk assessment process based on distinct classes and estimators, which we apply to a case study of a common communications security risk; a distributed denial of service attack (DDoS) attack. The ...
    • Cyber Weapons Storage Mechanisms 

      Yamin, Muhammad Mudassar; Katt, Basel; Kianpour, Mazaher (Journal article; Peer reviewed, 2019)
      In this paper, the current status of the art of cyber weapon storage methods and related processes are reviewed with particular reference to the safe guards present in storage of cyber weapons and contingency planning in ...
    • Describing Component Collaboration Using Goal Sequences 

      Carrez, Cyril; Floch, Jacqueline; Sanders, Richard (Journal article; Peer reviewed, 2008)
      Services are normally not performed by a single component, but result from the collaboration of several distributed components. Their precise specification and validation require complex models, where the intention of the ...
    • Easy 4G/LTE IMSI Catchers for Non-Programmers 

      Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina (Journal article; Peer reviewed, 2017)
      IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators. ...
    • Editorial Image Retrieval using Handcrafted and CNN Features 

      Brito, Claudia Companioni; Elawady, Mohamed; Yildirim, Sule; Hardeberg, Jon Yngve (Journal article; Peer reviewed, 2018)
      Textual keywords have been used in the early stages for image retrieval systems. Due to the huge increase of image content, an image is efficiently used instead according to the time computation. Deciding powerful feature ...
    • Enhancing Usage Control for Performance: An Architecture for Systems of Systems 

      Gkioulos, Vasileios; Rizos, Athanasios; Michailidou, Christina; Mori, Paolo; Saracino, Andrea (Journal article; Peer reviewed, 2019)
      The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and ...
    • GIF Image Retrieval in Cloud Computing Environment 

      Reyes, Evelyn Lissete Paiz; de Lima, Nadile Nunes; Yildirim, Sule (Journal article; Peer reviewed, 2018)
      GIF images have been used in the last years, especially on social media. Here it is explored a content-based image retrieval system to work specifically with GIF file format. Its implementation is extended to a cloud ...
    • Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces 

      Johnsen, Jan William; Franke, Katrin (Journal article; Peer reviewed, 2018)
      Traditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service ...
    • Key recovery: Inert and public 

      Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas (Journal article; Peer reviewed, 2017)
      We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and ...
    • Managing private credentials by privacy-preserving biometrics 

      Yang, Bian; Li, Guoqiang (Journal article; Peer reviewed, 2018)
      We investigate in this paper the need to managing a user’s private credentials using privacy-preserving biometrics, define several private credential management work models under different trust models between a user and ...
    • Mobile-Based Painting Photo Retrieval using Combined Features 

      Companioni-Brito, Claudia; Mariano, Zygred; Elawady, Mohamed; Yildirim Yayilgan, Sule (Journal article; Peer reviewed, 2018)
      In paintings or artworks, sharing a photo of a painting using mobile phone is simple and fast. However, searching for information about specific captured photo of an unknown painting takes time and is not easy. No previous ...
    • Offline Assisted Group Key Exchange 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Journal article; Peer reviewed, 2018)
      We design a group key exchange protocol with forward secrecy where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offline, ...
    • One click privacy for online social networks 

      Hehnle, Philipp; Keilbach, Pascal; Lee, Hyun-Jin; Lejn, Sabrina; Steidinger, Daniel; Weinbrenner, Marina; Langweg, Hanno (Journal article; Peer reviewed, 2017)
      We present an approach to reduce the complexity of adjusting privacy preferences for multiple online social networks. To achieve this, we quantify the effect on privacy for choices that users make, and simplify configuration ...
    • Pi-Cipher: Authenticated Encryption for Big Data 

      Gligoroski, Danilo; Mihajloska, Hristina; Samardjiska, Simona; Jacobsen, Håkon; Jensen, Rune Erlend; El-Hadedy, Mohamed (Chapter, 2014)
      In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, ...