• An Information Systems Design Theory for Digital Broker Platforms 

      Bley, Katja; Hentschel, Raoul; Pappas, Ilias (Peer reviewed; Journal article, 2022)
      Service platforms are becoming dominant drivers of daily business operations in a digitalized environment. Research focuses on technological and network effects of such platforms, while socio-technical opportunities remain ...
    • Investigating Aid Effectiveness in Developing Countries: The Case of Nepal 

      Karki, Yashoda; Pappas, Ilias (Peer reviewed; Journal article, 2020)
      Foreign aid serves as an important source of capital for any developing or under-developed country. It is very important to see how the recipient country can utilize this aid in the economic upliftment of the nation. Taking ...
    • Is a Smarter Grid Also Riskier? 

      Bernsmed, Karin; Jaatun, Martin Gilje; Frøystad, Christian (Journal article; Peer reviewed, 2019)
      The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ...
    • Lattice-Based Authenticated Key Exchange with Tight Security 

      Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi (Peer reviewed; Journal article, 2023)
      We construct the first tightly secure authenticated key exchange (AKE) protocol from lattices. Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our protocol is the first construction with ...
    • Lattice-Based Proof of Shuffle and Applications to Electronic Voting 

      Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor (Peer reviewed; Journal article, 2021)
      A verifiable shuffle of known values is a method for proving that a collection of commitments opens to a given collection of known messages, without revealing a correspondence between commitments and messages. We propose ...
    • Lattice-Based Signatures with Tight Adaptive Corruptions and More 

      Pan, Jiaxin; Wagner, Benedikt (Peer reviewed; Journal article, 2022)
      We construct the first tightly secure signature schemes in the multi-user setting with adaptive corruptions from lattices. In stark contrast to the previous tight constructions whose security is solely based on number-theoretic ...
    • Lazy learned screening for efficient recruitment 

      Espernakk, Erik; Knaldstad, Magnus Johan; Kofod-Petersen, Anders (Peer reviewed; Journal article, 2019)
      The transition from traditional paper based systems for recruitment to the internet has resulted in companies in getting a lot more applications. A majority of these applications are often unstructured documents sent over ...
    • Learning Hamiltonian Systems with Mono-Implicit Runge-Kutta Methods 

      Myhr, Håkon Noren (Journal article, 2023)
      Numerical integrators could be used to form interpolation conditions when training neural networks to approximate the vector field of an ordinary differential equation (ODE) from data. When numerical one-step schemes such ...
    • Learning multi-granularity dynamic network representations for social recommendation 

      Liu, Peng; Zhang, Lemei; Gulla, Jon Atle (Journal article; Peer reviewed, 2019)
      With the rapid proliferation of online social networks, personalized social recommendation has become an important means to help people discover useful information over time. However, the cold-start issue and the special ...
    • Locating Hydrogen Production in Norway Under Uncertainty 

      Stadlerova, Sarka; Aglen, Trygve Magnus; Hofstad, Andreas; Schütz, Peter (Peer reviewed; Journal article, 2022)
      In this paper, we study a two-stage stochastic multi-period facility location and capacity expansion problem. The problem is motivated by the real-world problem of locating facilities for green hydrogen in Norway. We ...
    • Mixed Precision in Heterogeneous Parallel Computing Platforms via Delayed Code Analysis 

      Cattaneo, Daniele; Maggioli, Alberto; Magnani, Gabriele; Denisov, Lev; Yang, Shufan; Agosta, Giovanni; Cherubin, Stefano (Journal article, 2023)
      Mixed Precision techniques have been successfully applied to improve the performance and energy efficiency of computation in embedded and high performance systems. However, few solutions have been proposed that address ...
    • Modular Design of KEM-Based Authenticated Key Exchange 

      Boyd, Colin Alexander; Millerjord, Lise; de Kock, Bor (Peer reviewed; Journal article, 2023)
    • Multi-instance Secure Public-Key Encryption 

      Brunetta, Carlo; Heum, Hans Waardal; Stam, Martijn (Peer reviewed; Journal article, 2023)
    • Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV 

      Kiltz, Eike; Pan, Jiaxin; Riepel, Doreen; Ringerud, Magnus Dotset (Peer reviewed; Journal article, 2023)
    • Neural Adaptive Caching Approach for Content Delivery Networks 

      Fan, Qilin; Yin, Hao; He, Qiang; Jiang, Yuming; Wang, Sen; Lyu, Yongqiang; Zhang, Xu (Peer reviewed; Journal article, 2019)
    • Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security 

      Wang, Yuyu; Pan, Jiaxin (Peer reviewed; Journal article, 2022)
      We construct the first non-interactive zero-knowledge (NIZK) proof systems in the fine-grained setting where adversaries’ resources are bounded and honest users have no more resources than an adversary. More concretely, ...
    • On Decisive Skyline Queries 

      Vlachou, Akrivi; Doulkeridis, Christos; Rocha-Junior, Joao B.; Nørvåg, Kjetil (Journal article; Peer reviewed, 2022)
      Skyline queries aim to identify a set of interesting objects that balance different user-specified criteria, i.e., that have values as good as possible in all specified criteria. However, objects whose values are good in ...
    • On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation 

      Gellert, Kai; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor (Journal article; Peer reviewed, 2023)
      A standard paradigm for building key exchange protocols with full forward secrecy (and explicit authentication) is to add key confirmation messages to an underlying protocol having only weak forward secrecy (and implicit ...
    • Optimization of a Ship-Based Logistics System for Carbon Capture and Storage 

      Bennæs, Anders; Skogset, Martin; Svorkdal, Tormod; Fagerholt, Kjetil; Herlicka, Lisa; Meisel, Frank; Rickels, Wilfried (Peer reviewed; Journal article, 2022)
      Carbon Capture and Storage (CCS) is the process of capturing CO2 before it enters the atmosphere, transporting it, and then storing the CO2 in a permanent underground storage site. CCS is projected to play an important ...
    • Optimizing Maritime Preparedness Under Uncertainty – Locating Tugboats Along the Norwegian Coast 

      Musæus, Julie Lovise; Nøstvik, Håkon M.; Andersson, Henrik; Schütz, Peter (Peer reviewed; Journal article, 2021)
      We study the strategic problem of locating tugboats along the Norwegian coast to optimize maritime preparedness. The problem is formulated as a two-stage stochastic program. In the first stage, we locate the tugboats such ...