Blar i Publikasjoner fra CRIStin - NTNU på tidsskrift "Lecture Notes in Computer Science (LNCS)"
Viser treff 61-80 av 134
-
An Information Systems Design Theory for Digital Broker Platforms
(Peer reviewed; Journal article, 2022)Service platforms are becoming dominant drivers of daily business operations in a digitalized environment. Research focuses on technological and network effects of such platforms, while socio-technical opportunities remain ... -
Investigating Aid Effectiveness in Developing Countries: The Case of Nepal
(Peer reviewed; Journal article, 2020)Foreign aid serves as an important source of capital for any developing or under-developed country. It is very important to see how the recipient country can utilize this aid in the economic upliftment of the nation. Taking ... -
Is a Smarter Grid Also Riskier?
(Journal article; Peer reviewed, 2019)The smart grid evolution digitalizes the traditional power distribution grid, by integrating information communication technology into its operation and control. A particularly interesting challenge is the integration of ... -
Lattice-Based Authenticated Key Exchange with Tight Security
(Peer reviewed; Journal article, 2023)We construct the first tightly secure authenticated key exchange (AKE) protocol from lattices. Known tight constructions are all based on Diffie-Hellman-like assumptions. Thus, our protocol is the first construction with ... -
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
(Peer reviewed; Journal article, 2021)A verifiable shuffle of known values is a method for proving that a collection of commitments opens to a given collection of known messages, without revealing a correspondence between commitments and messages. We propose ... -
Lattice-Based Signatures with Tight Adaptive Corruptions and More
(Peer reviewed; Journal article, 2022)We construct the first tightly secure signature schemes in the multi-user setting with adaptive corruptions from lattices. In stark contrast to the previous tight constructions whose security is solely based on number-theoretic ... -
Lazy learned screening for efficient recruitment
(Peer reviewed; Journal article, 2019)The transition from traditional paper based systems for recruitment to the internet has resulted in companies in getting a lot more applications. A majority of these applications are often unstructured documents sent over ... -
Learning Hamiltonian Systems with Mono-Implicit Runge-Kutta Methods
(Journal article, 2023)Numerical integrators could be used to form interpolation conditions when training neural networks to approximate the vector field of an ordinary differential equation (ODE) from data. When numerical one-step schemes such ... -
Learning multi-granularity dynamic network representations for social recommendation
(Journal article; Peer reviewed, 2019)With the rapid proliferation of online social networks, personalized social recommendation has become an important means to help people discover useful information over time. However, the cold-start issue and the special ... -
Locating Hydrogen Production in Norway Under Uncertainty
(Peer reviewed; Journal article, 2022)In this paper, we study a two-stage stochastic multi-period facility location and capacity expansion problem. The problem is motivated by the real-world problem of locating facilities for green hydrogen in Norway. We ... -
Mixed Precision in Heterogeneous Parallel Computing Platforms via Delayed Code Analysis
(Journal article, 2023)Mixed Precision techniques have been successfully applied to improve the performance and energy efficiency of computation in embedded and high performance systems. However, few solutions have been proposed that address ... -
Modular Design of KEM-Based Authenticated Key Exchange
(Peer reviewed; Journal article, 2023) -
Multi-instance Secure Public-Key Encryption
(Peer reviewed; Journal article, 2023) -
Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV
(Peer reviewed; Journal article, 2023) -
Neural Adaptive Caching Approach for Content Delivery Networks
(Peer reviewed; Journal article, 2019) -
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
(Peer reviewed; Journal article, 2022)We construct the first non-interactive zero-knowledge (NIZK) proof systems in the fine-grained setting where adversaries’ resources are bounded and honest users have no more resources than an adversary. More concretely, ... -
On Decisive Skyline Queries
(Journal article; Peer reviewed, 2022)Skyline queries aim to identify a set of interesting objects that balance different user-specified criteria, i.e., that have values as good as possible in all specified criteria. However, objects whose values are good in ... -
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation
(Journal article; Peer reviewed, 2023)A standard paradigm for building key exchange protocols with full forward secrecy (and explicit authentication) is to add key confirmation messages to an underlying protocol having only weak forward secrecy (and implicit ... -
Optimization of a Ship-Based Logistics System for Carbon Capture and Storage
(Peer reviewed; Journal article, 2022)Carbon Capture and Storage (CCS) is the process of capturing CO2 before it enters the atmosphere, transporting it, and then storing the CO2 in a permanent underground storage site. CCS is projected to play an important ... -
Optimizing Maritime Preparedness Under Uncertainty – Locating Tugboats Along the Norwegian Coast
(Peer reviewed; Journal article, 2021)We study the strategic problem of locating tugboats along the Norwegian coast to optimize maritime preparedness. The problem is formulated as a two-stage stochastic program. In the first stage, we locate the tugboats such ...