Below you can see the research output generated by Ph.D. student members of COINS.
Mohamed Abomhara
- Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien. Security and Privacy in the Internet of Things: Current Status and Open Issues
Bikash Agrawal
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk. R2Time: a framework to analyse OpenTSDB timeseries data in HBase
Vivek Agrawal
- Vivek Agrawal. Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Waqas Aman
- Waqas Aman, Einar Snekkenes. Event Driven Adaptive Security in Internet of Things
Maria Bartnes
- Maria Bartnes Line, Inger Anne Tøndel, Gorm Idar Johansen, Hanne Sæle. Informasjonssikkerhet og personvern:Støtte til risikoanalyse av AMS og tilgrensende systemer
- Inger Anne Tøndel, Maria Bartnes Line, Gorm Idar Johansen, Martin Gilje Jaatun. Risikoanalyse av AMS knyttet til informasjonssikkerhet og personvern
- Maria Bartnes Line, Bjørn Jonny Villa. Offentlige WiFi-nett er en større sikkerhetsrisiko enn falske basestasjoner
- Maria Bartnes Line. Beredskapsøvelser for IT-sikkerhetshendelser i kraftsektoren
- Maria Bartnes Line, Ali Zand, Gianluca Stringhini, Richard A. Kemmerer. Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
- Maria Bartnes Line. Kraftselskapene trener ikke på dataangrep
- Maria Bartnes Line, Karin Modig. Hackerangrep – hvor forberedt er du?
- Maria Bartnes Line. Smarte strømmålere – smartere hackere: et miniforedrag
- Maria Bartnes Line, Atle Abelsen. Det haster å sikre IT-system
- Maria Bartnes Line, Ali Zand, Gianluca Stringhini, Richard A. Kemmerer. Vær IT-beredt
- Maria Bartnes Line. Målrettede angrep – er nettselskapene forberedt?
- Maria Bartnes Line, Leif Martin Kirknes. Ikke godt nok forberedt
- Maria Bartnes Line. Smarte strømnett former fremtiden
- Atle Abelsen, Maria Bartnes Line, Atle Årnes. Vokter personvernet
- Inger Anne Tøndel, Maria Bartnes Line, Martin Gilje Jaatun. Information security incident management: Current practice as reported in the literature
- Cathrine Hove, Marte Tårnes, Maria Bartnes Line, Karin Bernsmed. Information security incident management: Identified practice in large organizations
- Maria Bartnes Line, Inger Anne Tøndel, Martin Gilje Jaatun. Information security incident management: Planning for failure
- Maria Bartnes Line. Etterlyser nytenkning hos nettselskapene
- Maria Bartnes Line. Fem spørsmål om personvern
- Maria Bartnes Line. Eksersis mot strøm-hackere
- Erlend Andreas Gjære, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Åsmund Ahlmann Nyre, Karin Bernsmed, Maria Bartnes Line. Infosec – Blogg fra faggruppe for informasjonssikkerhet, SINTEF IKT
- Maria Bartnes Line. Why securing smart grids is not just a straightforward consultancy exercise
Antorweep Chakravorty
- Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk. R2Time: a framework to analyse OpenTSDB timeseries data in HBase
- Antorweep Chakravorty. Spørsmål om Smarthus
- Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk. A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
- Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk. A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
- Antorweep Chakravorty. Amerikanere hyller norsk student-idé
- Antorweep Chakravorty. Smart eller overvåket?
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
- Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
Seraj Fayyad
- Arne J. Berre, Erol Cagatay, Hai-Ying Liu, Josef Noll, Michael John Kobernus, Nuria Castell, Seraj Fayyad, Wesal Khattak. Citi-Sense-MOB. Conceptual services design document.
- Seraj Fayyad, Josef Noll. Toward Real Time IT Risk Assessment Methodology
- Seraj Fayyad, Josef Noll. Security and Safety Composition Methodology
Britta Hale
- Britta J. Hale, Colin Alexander Boyd. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
- Britta J. Hale, Colin Alexander Boyd. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
Håkon Jacobsen
- Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy. CAESAR candidate PiCipher
- Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed Ezzat El Hadedy Aly. Pi-Cipher: Authenticated Encryption for Big Data
Oleksandr Kazymyrov
- Dmytro Kaidalov, Roman Oliynykov, Oleksandr Kazymyrov. A method for security estimation of the SPN-based block cipher against related-key attacks
- Oleksandr Kazymyrov. Methods and Tools for Analysis of Symmetric Cryptographic Primitives
Kjetil Kjernsmo
- Kjetil Kjernsmo. RDF::LinkedData
- Kjetil Kjernsmo. The prevalence of HTTP caching headers on SPARQL Endpoint
- Gregory Todd Williams, Kjetil Kjernsmo. Pushing complexity down the stack
Chunlei Li
- Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth. Some results on cross-correlation distribution between a p-Ary m-sequence and its decimated sequences
- Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth. A class of de Bruijn sequences
- Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan. Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
- Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang. Optimal ternary cyclic codes with minimum distance four and five
- Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding. The weight distributions of several classes of cyclic codes from APN monomials
- Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu. The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
- Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li. Cross-correlation between a p-ary m-sequence and its all decimated sequences for d = (pm+1)(pm+p-1)/p+1
- Chunlei Li. Sequences and Linear Codes from Highly Nonlinear Functions
Guoqiang Li
- Guoqiang Li, Christoph Busch, Bian Yang. A novel approach used for measuring fingerprint orientation of arch fingerprint
- Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch. Cloud Password Manager Using Privacy-Preserved Biometrics
- Guoqiang Li, Bian Yang, Christoph Busch. A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code
Yan Li
- Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen. Approaches for the combined use of risk analysis and testing: A systematic literature review
Yi-Ching Liao
- Rune Nordvik, Yi-Ching Liao, Hanno Langweg. AccountabilityFS: A File System Monitor for Forensic Readiness
- Yi-Ching Liao, Hanno Langweg. Resource-Based Event Reconstruction of Digital Crime Scenes
- Yi-Ching Liao, Hanno Langweg. Process Tracking for Forensic Readiness
- Yi-Ching Liao, Hanno Langweg. Cost-benefit analysis of kernel tracing systems for forensic readiness
Soumik Mondal
- Kiran Bylappa Raja, Rachamandra Raghavendra, Christoph Busch, Soumik Mondal. An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum
- Soumik Mondal, Patrick Bours. Continuous Authentication using Fuzzy Logic
Martin Aastrup Olsen
- Marek Dusio, Martin Aastrup Olsen, Christoph Busch. Fingerprint sample quality assessment via ridge line count using Laplacian of Gaussian edge finding
- Ivan Danov, Martin Aastrup Olsen, Christoph Busch. Interpretation of fingerprint image quality features extracted by self-organizing maps
- Jinghua Wang, Martin Aastrup Olsen, Christoph Busch. Finger image quality based on singular point localization
Pankaj Pandey
- Pankaj Pandey, Einar Snekkenes. Using prediction markets to hedge information security risks
- Pankaj Pandey, Einar Snekkenes. Using Prediction Markets to Hedge Information Security Risks
- Pankaj Pandey, Einar Snekkenes. An Assessment of Market Methods for Information Security Risk Management
- Pankaj Pandey, Einar Snekkenes. Applicability of Prediction Markets in Information Security Risk Management
Simona Samardjiska
- Simona Samardjiska, Danilo Gligoroski. Linearity Measures for Multivariate Public Key Cryptography
- Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy. CAESAR candidate PiCipher
- Danilo Gligoroski, Simona Samardjiska. iSHAKE: Incremental Hashing With SHAKE128 and SHAKE256 for the Zettabyte Era
- Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed Ezzat El Hadedy Aly. Pi-Cipher: Authenticated Encryption for Big Data
Kashif Habib Sheikh
- Kashif Habib. Ethical Aspects of the Internet of Things in eHealth
- Kashif Habib. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth
- Kashif Habib, Arild Braathen Torjusen, Wolfgang Leister. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth
Berglind Smaradottir
- Martin Gerdes, Berglind Smaradottir, Rune Werner Fensli. End-to-End Infrastructure for Usability Evaluation of eHealth Applications and Services
- Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen, Rune Werner Fensli, Santiago Martinez. Usability Evaluation of Electronic forms and Collaborative Asssessment Report in an Intermunicipality Health Care team for Dementia Diagnose
- Rune Werner Fensli, Martin Gerdes, Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen. Samhandling på tvers med fokus på sikker implementering, avklaring av databehandlingsansvar og varige driftsløsninger
- Berglind Smaradottir, Santiago Martinez. Fremtidens eldreomsorg i eget hjem, demonstrasjon av velferdsteknologi
- Berglind Smaradottir, Martin Gerdes. Demonstration of United4Health telemedicine application for home-monitoring of COPD-symptoms
- Berglind Smaradottir. Senter for eHelse presenterer forskningsprosjektet United4Health
- Martin Gerdes, Berglind Smaradottir, Rune Werner Fensli. End-to-end Infrastructure for Usability Evaluation of eHealth Applications and Services
- Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen, Rune Werner Fensli, Santiago Martinez. Usability Evaluation of Electronic forms and Collaborative Asssessment Report in an Inter-municipality Health Care team for Dementia Diagnose
Ctirad Sousedik
- Niclas Overgaard, Ctirad Sousedik, Christoph Busch. Eulerian Video Magnification for Fingerprint Liveness Detection
- Ctirad Sousedik, Christoph Busch. Quality of Fingerprint Scans captured using Optical Coherence Tomography
- John Ellingsgård, Ctirad Sousedik, Christoph Busch. Detecting fingerprint alterations by orientation field and minutiae orientation analysis
- Ctirad Sousedik, Christoph Busch. Presentation attack detection methods for fingerprint recognition systems: a survey
Aryan TaheriMonfared
- Aryan TaheriMonfared, Chunming Rong. Flexible Building Blocks for Software Defined Network Function Virtualization
- Aryan TaheriMonfared, Chunming Rong. Flexible Building Blocks for Software Defined Network Function Virtualization
Mohsen Toorani
- Mohsen Toorani. Security analysis of J-PAKE
Joseph Twayigira
- Joseph Twayigira, Vladimir Oleshchuk. User authentication in mobile cloud-based crisis and emergency management
Nils Ulltveit-Moe
- Nils Ulltveit-Moe. Science ethics: Young scientists speak [14]
- Terje Gjøsæter, Nils Ulltveit-Moe, Mohan Lal Kolhe, Rune Hylsberg Jacobsen, Emad Samuel Malki Ebeid. Security and Privacy in the SEMIAH Home Energy Management System
- Stefan Siegl, Nils Ulltveit-Moe. Secure by design:An approach for a virtual power plant
- Nils Ulltveit-Moe. My Experience doing a PhD
- Nils Ulltveit-Moe. A roadmap towards improving managed security services from a privacy perspective
- Nils Ulltveit-Moe. Reversible Anonymiser for XML Documents
- Nils Ulltveit-Moe. Cloud-based Mobile Health Apps
- Shelly Benjaminy, Rosalie Doerksen, Fengbo Li, Roddy Grieves, Girish Valluru, Karen J. Jacob, Cody Lo, Nina Di Pietro, Brett Favaro, Jiang Zhao, Kelly P. Downing, Ádán Kun, Yi Weng, Xin Miao, Nils Ulltveit-Moe. Science ethics: Young scientists speak
- Nils Ulltveit-Moe, Geir Lid, Stein Harald Øigård. Kunnskapens teaterscene
- Nils Ulltveit-Moe. Privacy-enhanced Network Monitoring
- Nils Ulltveit-Moe. Privacy enhancing Technologies for Cloud Computing
- Nils Ulltveit-Moe, Svein Walstad. Doktoranden fra Mo
- Nils Ulltveit-Moe. Privacy-enhanced Network Monitoring
- Nils Ulltveit-Moe, Liv Eva Welhaven Løchen, Håvard Raustøl. Han vil redde dine opplysninger
- Nils Ulltveit-Moe, Håvard Raustøl. Radiointervju med Nils Ulltveit-Moe på Sørlandssendinga om doktorgradsavhandlingen “Personvernforbedret dataovervåkning”
- Nils Ulltveit-Moe, Svein Walstad. Tar doktorgrad og forsker på datasikkerhet i Europa
- Nils Ulltveit-Moe. SnakeSpeed – Compete with Snakes on Eating the Frog
- Zhendong Ma, Paul Smith, Kieran McLaughlin, Nils Ulltveit-Moe, Jörg Kippe. PRECYSE Security Technologies for Critical Infrastructure Security
- Nils Ulltveit-Moe, Leonardo Grassi. PRECYSE Framework for ICS Security: Methodology, Architecture and Test suite
- Nils Ulltveit-Moe, Terje Gjøsæter. WP2 Methodology to identify assets and associated threats and vulnerabilities
Dijana Vukovic
- Dijana Vukovic, Zoran Djuric, Danilo Gligoroski. CryptoCloak application – main idea, an overview and improvement proposal
- Dijana Vukovic. CryptoCloak as a Protection Against Internet Surveillance
- Dijana Vukovic, Danilo Gligoroski, Zoran Djuric. Improvement Proposal for the CryptoCloak Application
- Ognjen V Joldzic, Zoran Djuric, Dijana Vukovic. Experiences and Challenges in Implementing Adaptive Bitrate Multimedia Streaming for Live Multimedia Content
- Ognjen V Joldzic, Zoran Djuric, Dijana Vukovic. Experiences and Challenges in Implementing Adaptive Bitrate Multimedia Streaming for Live Multimedia Content
- Dijana Vukovic. Security Issues of Passive RFID Tags Used in Internet of Things (IoT)
- Dijana Vukovic. Security Issues in Internet of Things (IoT) Related to Passive RFID Tags
- Dijana Vukovic, Zoran Djuric, Danilo Gligoroski. CryptoCloak – Improvement Proposal Implementation
- Dijana Vukovic, Danilo Gligoroski, Zoran Djuric. On Privacy Protection in the Internet Surveillance Era
Gaute Wangen
- Gaute Wangen, Einar Snekkenes. A Comparison between Business Process Management and Information Security Management
Goitom Weldehawaryat
- Goitom Weldehawaryat, Stephen Wolthusen. Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence
Huihui Yang
- Huihui Yang, Vladimir Oleshchuk. An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
- Huihui Yang, Jiao Lei, Vladimir Oleshchuk. A General Framework for Group Authentication and Key Exchange Protocols
Kassaye Yitbarek Yigzaw
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. A communicable disease prediction benchmarking platform
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Evaluation of Secure Multi-Party Computation for Reuse of Distributed Electronic Health Data
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. A communicable disease prediction benchmarking platform
- Johan Gustav Bellika, Torje Dahle Henriksen, Kassaye Yitbarek Yigzaw. The Snow System – a Decentralized Medical Data Processing System
- Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Evaluation of secure multi-party computation for reuse of distributed electronic health data
- Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen. Privacy preserving health data processing
- Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen. Privacy preserving health data processing