• Signatures with Tight Multi-user Security from Search Assumptions 

      Pan, Jiaxin; Ringerud, Magnus (Peer reviewed; Journal article, 2020)
      We construct two tightly secure signature schemes based on the computational Diffie-Hellman (CDH) and factoring assumptions in the random oracle model. Our schemes are proven secure in the multi-user setting, and their ...
    • Signed Diffie-Hellman Key Exchange with Tight Security 

      Pan, Jiaxin; Qian, Chen; Ringerud, Magnus (Peer reviewed; Journal article, 2021)
      We propose the first tight security proof for the ordinary two-message signed Diffie-Hellman key exchange protocol in the random oracle model. Our proof is based on the strong computational Diffie-Hellman assumption and ...
    • A Simple and Efficient Framework of Proof Systems for NP 

      Wang, Yuyu; Su, Chuanjie; Pan, Jiaxin; Chen, Yu (Peer reviewed; Journal article, 2023)
    • Situational States Influence on Team Workload Demands in Cyber Defense Exercise 

      Ask, Torvald Fossåen; Sütterlin, Stefan; Knox, Benjamin James; Lugo, Ricardo Gregorio (Peer reviewed; Journal article, 2021)
      Cyber operations are increasingly automated processes that can occur at computational speed with the intent of reducing, or denying time for good decision making or time to ground communication between human agents. There ...
    • The Snow Grooming Routing Problem 

      Andersson, Carl Henrik; Høyland, Sondre; Krogstad, Jesper Anker; Flatberg, Truls; Gullhav, Anders Nordby (Peer reviewed; Journal article, 2023)
      There are more than 30,000 km of cross-country skiing tracks in Norway, and to maintain these track networks municipalities and local ski clubs spend more than 250 million NOK every year. The primary cost driver is the ...
    • Social Constructionism in Security Protocols 

      Foley, Simon N.; Rooney, Vivien (Peer reviewed; Journal article, 2020)
      Understanding the human in computer security through Qualitative Research aims at a conceptual repositioning. The aim is to leverage individual human experience to understand and improve the impact of humans in computer ...
    • Social Constructionism in Security Protocols (Transcript of Discussion) 

      Foley, Simon N.; Rooney, Vivien (Peer reviewed; Journal article, 2020)
      This is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Vivien’s an applied psychologist. We’re interested in understanding how humans experience working with security protocols. ...
    • SP-BERT: A Language Model for Political Text in Scandinavian Languages 

      Doan, Tu My; Kille, Benjamin Uwe; Gulla, Jon Atle (Journal article, 2023)
      Language models are at the core of modern Natural Language Processing. We present a new BERT-style language model dedicated to political texts in Scandinavian languages. Concretely, we introduce SP-BERT, a model trained ...
    • Spectral estimation of chromatically adapted corresponding colors 

      Habib, Syeda Tanzima; Green, Philip John (Journal article; Peer reviewed, 2019)
      This paper reviews the estimation of spectral reflectance for corresponding colors in XYZ color space, including both corresponding color data sets and chromatically adapted colorimetry. For use in color management workflows, ...
    • Symmetric Key Exchange with Full Forward Security and Robust Synchronization 

      Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise (Peer reviewed; Journal article, 2021)
      We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous ...
    • Task-driven Compression for Collision Encoding based on Depth Images 

      Kulkarni, Mihir; Alexis, Konstantinos (Peer reviewed; Journal article, 2023)
      This paper contributes a novel learning-based method for aggressive task-driven compression of depth images and their encoding as images tailored to collision prediction for robotic systems. A novel 3D image processing ...
    • Technology-Enhanced Organizational Learning: A Systematic Literature Review 

      Giannakos, Michail; Mikalef, Patrick; Pappas, Ilias (Journal article; Peer reviewed, 2019)
      E-Learning systems are receiving ever increasing attention in, academia, businesses as well as in public administrations. Managers and employee who need efficient forms of training as well as learning flow within the ...
    • The Role of Big Data in Addressing Societal Challenges: A Systematic Mapping Study 

      Quayyum, Farzana; Pappas, Ilias; Jaccheri, Letizia (Journal article; Peer reviewed, 2019)
      Big data has recently become the focus of academic and corporate investigation due to its high potential in generating business and social value. We have done a systematic mapping of the literature related to big data and ...
    • Tighter Security for Generic Authenticated Key Exchange in the QROM 

      Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      Home Advances in Cryptology – ASIACRYPT 2023 Conference paper Tighter Security for Generic Authenticated Key Exchange in the QROM Download book PDF Download book EPUB Tighter Security for Generic Authenticated Key ...
    • Toward Employee-Driven Digital Innovation in Public Organizations Through the Use of Action Design Research 

      Opland, Leif Erik; Jaccheri, Maria Letizia; Engesmo, Jostein; Pappas, Ilias (Peer reviewed; Journal article, 2020)
      Innovation is important for development in the private sector, but inevitably public sector also needs innovation to enhance services and processes, with research on employee-driven digital innovation in public organizations ...
    • Towards Cloud Storage Tier Optimization with Rule-Based Classification 

      Khan, Akif Quddus; Nikolov, Nikolay Vladimirov; Matskin, Mihhail; Prodan, Radu; Bussler, Christoph; Roman, Dumitru; Soylu, Ahmet (Peer reviewed; Journal article, 2023)
      Cloud storage adoption has increased over the years as more and more data has been produced with particularly high demand for fast processing and low latency. To meet the users’ demands and to provide a cost-effective ...
    • Towards Optimal Ship Navigation Using Image Processing 

      Sahin, Bekir; Uddin, Zia; Soylu, Ahmet (Peer reviewed; Journal article, 2020)
      Shipping transportation developed over years with the technological advancements. Modern ship navigation is conducted with the help of Automatic Radar Plotting Aid (ARPA) and Electronic Chart Display and Information System ...
    • Tramp Ship Routing with Bunker Optimization and Flexible Cargo Quantities: Case from Dry Bulk Shipping 

      Omholt-Jensen, Simen; Fagerholt, Kjetil; Meisel, Frank (Peer reviewed; Journal article, 2023)
      We study the Tramp Ship Routing and Scheduling Problem with Bunker Optimization (TSRSPBO). The TSRSPBO includes, in addition to the routing and scheduling of the vessels in the given fleet, decisions about how much to ...
    • Unbounded HIBE with Tight Security 

      Langrehr, Roman; Pan, Jiaxin (Peer reviewed; Journal article, 2020)
      We propose the first tightly secure and unbounded hierarchical identity-based encryption (HIBE) scheme based on standard assumptions. Our main technical contribution is a novel proof strategy that allows us to tightly ...
    • Unconditionally Secure NIZK in the Fine-Grained Setting 

      Wang, Yuyu; Pan, Jiaxin (Peer reviewed; Journal article, 2022)
      Non-interactive zero-knowledge (NIZK) proof systems are often constructed based on cryptographic assumptions. In this paper, we propose the first unconditionally secure NIZK system in the AC0 -fine-grained setting. More ...