• Analysis of uPort Open, an identity management blockchain-based solution 

      Panait, Andreea E.; Olimid-Nencioni, Ruxandra-Florentina; Stefanescu, Alin (Peer reviewed; Journal article, 2020)
      Recently, academics and professionals proposed a substantial number of identity management solutions based on blockchain technology. Among them, uPort appeared promising, being considered for both personal and administrative ...
    • Applications of an Online Audience Response System in Different Academic Settings: An Empirical Study 

      Amro, Ahmed Walid; Yamin, Muhammad Mudassar; Knox, Benjamin James (Peer reviewed; Journal article, 2020)
      Technology dependent, digitally innate students are joining academia. Consequently, traditional pedagogical techniques for achieving desired learning outcomes are not universally sufficient. Digital clickers were introduced ...
    • Automatically Detecting Political Viewpoints in Norwegian Text 

      Doan, Tu My; Baumgartner, David; Kille, Benjamin Uwe; Gulla, Jon Atle (Journal article, 2024)
      We introduce three resources to support research on political texts in Scandinavia. The encoder-decoder transformer models sp-t5 and sp-t5-keyword were trained on political texts. The nor-pvi (available at https://tinyur ...
    • Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption 

      Galteland, Yao Jiang; Pan, Jiaxin (Peer reviewed; Journal article, 2023)
      The understanding of directionality for updatable encryption (UE) schemes is important, but not yet completed in the literature. We show that security in the backward-leak uni-directional key updates setting is equivalent ...
    • A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks 

      Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Boyd, Colin Alexander; Haines, Thomas Edmund (Peer reviewed; Journal article, 2019)
      A Blind Coupon Mechanism (BCM) allows spreading of alerts quietly and quickly over unreliable networks. The BCM primitive ensures that alerts are efficiently broadcast while the nature of these signals are securely hidden. ...
    • Cryptographic smooth neighbors 

      Bruno, Giacomo; Corte-Real Santos, Maria; Costello, Craig; Eriksen, Jonathan Komada; Meyer, Michael; Naehrig, Michael; Sterner, Bruno (Peer reviewed; Journal article, 2023)
      We revisit the problem of finding two consecutive B-smooth integers by giving an optimised implementation of the Conrey-Holmstrom-McLaughlin “smooth neighbors” algorithm. While this algorithm is not guaranteed to return ...
    • CyberEscape Approach to Advancing Hard and Soft Skills in Cybersecurity Education 

      Pirta-Dreimane, Rūta; Brilingaite, A.; Roponena, Evita; Parish, Karen; Grabis, Janis; Lugo, Ricardo Gregorio; Bonders, Martins (Peer reviewed; Journal article, 2023)
      Incorporating gamification elements and innovative approaches in training and educational programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity training should consider a combination of hard and ...
    • Detection of Running Malware Before it Becomes Malicious 

      Banin, Sergii; Dyrkolbotn, Geir Olav (Peer reviewed; Journal article, 2020)
      As more vulnerabilities are being discovered every year [17], malware constantly evolves forcing improvements and updates of security and malware detection mechanisms. Malware is used directly on the attacked systems, thus ...
    • Fast and Secure Updatable Encryption 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Peer reviewed; Journal article, 2020)
      Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update ...
    • Gender Differences in Psychosocial Experiences with Humanoid Robots, Programming, And Mathematics Course 

      Tilden, Solveig; Lugo, Ricardo Gregorio; Parish, Karen; Mishra, Deepti; Knox, Benjamin James (Peer reviewed; Journal article, 2021)
      Introduction: There is a gender imbalance in Computer science (CS) and STEM education and careers where males are more represented. With evolving technologies arising and the need for a more diverse workforce, it is important ...
    • Human-Human Communication in Cyber Threat Situations: A Systematic Review 

      Ask, Torvald Fossåen; Lugo, Ricardo Gregorio; Knox, Benjamin James; Sütterlin, Stefan (Peer reviewed; Journal article, 2021)
      In cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time ...
    • Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs 

      Haines, Thomas Edmund; Gritti, Clementine Jeanne Pierrette (Journal article; Peer reviewed, 2019)
      Verifiable electronic voting promises to ensure the correctness of elections even in the presence of a corrupt authority, while providing strong privacy guarantees. However, few practical systems with end-to-end verifiability ...
    • Improving the Analysis of GPC in Real-Time Calculus 

      Tang, Yue; Jiang, Yuming; Guan, Nan (Journal article; Peer reviewed, 2019)
      Real-Time Calculus (RTC) is a framework for modeling and performance analysis of real-time networked systems. In RTC, workload and resources are modeled as arrival and service curves, and processing semantics are modeled ...
    • Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used 

      Sütterlin, Stefan; Ask, Torvald Fossåen; Mägerle, Sophia; Glöckler, Sandra; Wolf, Leandra; Schray, Julian; Chandi, Alava; Bursac, Teodora; Khodabakhsh, Ali; Knox, Benjamin James; Canham, Matthew; Lugo, Ricardo Gregorio (Peer reviewed; Journal article, 2023)
      AI-generated “deep fakes” is increasingly used by cybercriminals conducting targeted and tailored social engineering attacks, and for influencing public opinion. To raise awareness and efficiently train individuals in ...
    • Is a Smarter Grid Also Riskier? 

      Bernsmed, Karin; Jaatun, Martin Gilje; Frøystad, Christian (Journal article; Peer reviewed, 2019)
      The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ...
    • Neural Adaptive Caching Approach for Content Delivery Networks 

      Fan, Qilin; Yin, Hao; He, Qiang; Jiang, Yuming; Wang, Sen; Lyu, Yongqiang; Zhang, Xu (Peer reviewed; Journal article, 2019)
    • Practical Isogeny-Based Key-Exchange with Optimal Tightness 

      de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia (Journal article; Peer reviewed, 2021)
      We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key-exchange algorithm. Our security proof has optimal tightness, which means that the protocol is efficient even when ...
    • The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills 

      Sütterlin, Stefan; Lugo, Ricardo Gregorio; Ask, Torvald Fossåen; Veng, Karl; Eck, Jonathan; Fritschi, Jonas; Talha-Özmen, Muhammed; Bärreiter, Basil; Knox, Benjamin James (Peer reviewed; Journal article, 2022)
      The emergence of synthetic media such as deep fakes is considered to be a disruptive technology shaping the fight against cybercrime as well as enabling political disinformation. Deep faked material exploits humans’ ...
    • Secure channels and termination: The last word on TLS 

      Boyd, Colin Alexander; Hale, Britta (Peer reviewed; Journal article, 2019)
      Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channel. In this work we ...
    • Selecting and Training Young Cyber Talent: A European Cybersecurity Challenge Case Study 

      Yamin, Muhammad Mudassar; Katt, Basel; Torseth, Espen (Peer reviewed; Journal article, 2021)
      With the increasing popularization of cybersecurity concepts due to ever increasing cybersecurity incidents, it is no secret that countries worldwide are investing heavily in cybersecurity education to build the necessary ...