Active supervisors

Norwegian University of Science and Technology


E-mail:            stefan.axelsson@ntnu.no
Homepage:    https://www.ntnu.no/ansatte/stefan.axels…

Students supervised:

  • Dmytro Piatkivskyi, 2015-2018: ‘Anonymity of the off-chain transactions in Bitcoin’
  • Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’
  • Gunnar Alendal, 2016-2020: ‘Security vulnerability research for use in digital forensic acquisition’
  • Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’
  • Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’


E-mail:            patrick.bours@ntnu.no
Homepage:    http://www.ansatt.hig.no/patrickb/

Students supervised:

  • Soumik Mondal, 2012-2016: ‘Continuous Authentication using Behavioural Biometrics’
  • Guoqiang Li, 2012-2016: ‘Biometric indexing’

Publications co-authored with COINS students:

  1. Patrick Bours, Soumik Mondal (2013). Continuous Authentication using Behavioural Biometrics
  2. Soumik Mondal, Patrick Bours (2013). Continuous Authentication using Mouse Dynamics
  3. Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus (2013). Complexity measurement of a password for keystroke dynamics: preliminary study
  4. Soumik Mondal, Patrick Bours (2014). Continuous Authentication using Fuzzy Logic
  5. John V. Monaco, Gonzalo Perez, Charles C. Tappert, Patrick Bours, Soumik Mondal, Sudalai Rajkumar, Aythami Morales, Julian Fierrez, Javier Ortega-Garcia (2015). One-handed Keystroke Biometric Identification Competition
  6. Patrick Bours, Soumik Mondal (2015). Continuous Authentication with Keystroke Dynamics
  7. Patrick Bours, Soumik Mondal (2015). Performance evaluation of continuous authentication systems
  8. Soumik Mondal, Patrick Bours (2015). A Computational Approach to the Continuous Authentication Biometric System
  9. Soumik Mondal, Patrick Bours (2015). Context independent continuous authentication using behavioural biometrics
  10. Soumik Mondal, Patrick Bours (2015). Continuous Authentication in a Real World Settings
  11. Soumik Mondal, Patrick Bours (2015). Continuous authentication and identification for mobile devices: Combining security and forensics
  12. Soumik Mondal, Patrick Bours (2015). Does Context matter for the Performance of Continuous Authentication Biometric Systems? An Empirical Study on Mobile Device
  13. Soumik Mondal, Patrick Bours (2015). Swipe Gesture based Continuous Authentication for Mobile Devices
  14. Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Soumik Mondal, Patrick Bours (2015). Keystroke Dynamics Performance Enhancement With Soft Biometrics
  15. Soumik Mondal, Patrick Bours (2016). Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification
  16. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours (2017). Classification of Fingerprints Captured Using Optical Coherence Tomography
  17. Ctirad Sousedik, Ralph Breithaupt, Patrick Bours (2017). Classification of fingerprints captured using optical coherence tomography


E-mail:            colin.boyd@item.ntnu.no
Homepage:    http://www.item.ntnu.no/people/personalp…

Students supervised:

  • Britta Hale, 2014-2018: ‘Modelling and Analysis of Real-World Cryptographic Authentication and Key-Exchange Protocols’
  • Chris Carr, 2014-2018: ‘Protection in Complex Cyber Systems’
  • Enio Marku, 2017-2021: ‘Securing emerging network technologies with homomorphic encryption’

Publications co-authored with COINS students:

  1. Britta J. Hale, Colin Alexander Boyd (2014). Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
  2. Britta J. Hale, Colin Alexander Boyd (2014). Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
  3. Colin Alexander Boyd, Britta Hale (2016). Secure Channels and Termination: The Last Word on TLS
  4. Colin Alexander Boyd, Christopher Carr (2016). Fair client puzzles from the Bitcoin blockchain
  5. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS
  6. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  7. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
  8. Colin Alexander Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila (2016). Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS
  9. Colin Alexander Boyd, Xavier Boyen, Christopher Carr, Thomas Haines (2016). Key Recovery: Inert, Public, Transparent (KRIPT)


E-mail:            christoph.busch@ntnu.no
Homepage:    http://www.christoph-busch.de/

Students supervised:

  • Martin Aastrup Olsen, 2011-2015: ‘Fingerprint Image Quaity (employer: CASED)’
  • Anika Pflug, 2011-2015: ‘2D and 3D Ear Recognition (employer: CASED)’
  • Ctirad Sousedik, 2012-2018: ‘Fake Resistant Fingerprint Biometrics’
  • Guoqiang Li, 2012-2016: ‘Biometric indexing’
  • Martin Stokkenes, 2015-2018: ‘Secure and Privacy Preserving Biometrics for Transaction Authentication’
  • Pankaj Wasnik, 2016-2019: ‘Presentation Attack Detection for Smartphone Based Biometric Authentication System’
  • Patrick Schuch, 2015-2021: ‘Representation Learning for Fingerprint Recognition (employer: Dermalog)’
  • Kiran Bylappa Raja, 2013-2016: ‘Smartphone Based Hand Biometrics’
  • Pawel Drozdowski, 2016-2019: ‘Efficient privacy-preserving identification in large-scale multi-biometric systems (employer: Hochschule Darmstadt)’

Publications co-authored with COINS students:

  1. Bian Yang, Lisa Rajbhandari, Christoph Busch, Xuebing Zhou (2012). Privacy Implications of Identity References in Biometrics Databases
  2. Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
  3. Bian Yang, Guoqiang Li, Christoph Busch (2013). Qualifying fingerprint samples captured by smartphone cameras
  4. Ctirad Sousedik, Ralph Breithaupt, Christoph Busch (2013). Volumetric Fingerprint Data Analysis using Optical Coherence Tomography
  5. Guoqiang Li, Bian Yang, Christoph Busch (2013). Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones
  6. Guoqiang Li, Bian Yang, Christoph Busch (2013). Lightweight Quality Metrics for Smartphone Camera based Fingerprint Samples
  7. Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch (2013). Quality Assessment for Fingerprints Collected by Smartphone Cameras
  8. Martin Aastrup Olsen, Elham Tabassi, Anton Makarov, Christoph Busch (2013). Self-Organizing Maps for Fingerprint Image Quality Assessment
  9. Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
  10. Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
  11. Ctirad Sousedik, Christoph Busch (2014). Presentation attack detection methods for fingerprint recognition systems: a survey
  12. Ctirad Sousedik, Christoph Busch (2014). Quality of Fingerprint Scans captured using Optical Coherence Tomography
  13. Guoqiang Li, Bian Yang, Christoph Busch (2014). A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code
  14. Guoqiang Li, Christoph Busch, Bian Yang (2014). A novel approach used for measuring fingerprint orientation of arch fingerprint
  15. Ivan Danov, Martin Aastrup Olsen, Christoph Busch (2014). Interpretation of fingerprint image quality features extracted by self-organizing maps
  16. Jinghua Wang, Martin Aastrup Olsen, Christoph Busch (2014). Finger image quality based on singular point localization
  17. John Ellingsgård, Ctirad Sousedik, Christoph Busch (2014). Detecting fingerprint alterations by orientation field and minutiae orientation analysis
  18. Kiran Bylappa Raja, Rachamandra Raghavendra, Christoph Busch, Soumik Mondal (2014). An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum
  19. Marek Dusio, Martin Aastrup Olsen, Christoph Busch (2014). Fingerprint sample quality assessment via ridge line count using Laplacian of Gaussian edge finding
  20. Niclas Overgaard, Ctirad Sousedik, Christoph Busch (2014). Eulerian Video Magnification for Fingerprint Liveness Detection
  21. Carsten Gottschlich, Anna Mikaelyan, Martin Aastrup Olsen, Josef Bigun, Christoph Busch (2015). Improving Fingerprint Alteration Detection
  22. Edlira Nepravishta Martiri, Bian Yang, Christoph Busch (2015). Protected Honey Face Templates
  23. Guoqiang Li, Bian Yang, Christoph Busch (2015). A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation
  24. Guoqiang Li, Bian Yang, Christoph Busch (2015). A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction
  25. Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch (2015). Towards generating protected fingerprint templates based on bloom filters
  26. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Fusion of Face and Periocular Information for Improved Authentication on Smartphones
  27. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Multi-modal Authentication System for Smartphones Using Face, Iris and Periocular
  28. Martin Aastrup Olsen, Marek Dusio, Christoph Busch (2015). Fingerprint skin moisture impact on biometric performance
  29. Martin Aastrup Olsen, Martin Böckeler, Christoph Busch (2015). Predicting Dactyloscopic Examiner Fingerprint Image Quality Assessments
  30. Edlira Martiri, Marta Gomez-Barrero, Bian Yang, Christoph Busch (2016). Biometric template protection based on Bloom filters and honey templates
  31. Guoqiang Li, Bian Yang, Christoph Busch (2016). A Fingerprint Indexing Algorithm on Encrypted Domain
  32. Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2016). ‘Authentication protocols for biometric identity on smartphones – An overview’
  33. Martin Stokkenes, Raghavendra Ramachandra, Kiran B. Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2016). ‘Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters’
  34. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Ramachandra Raghavendra, Christoph Busch (2016). Eye region based multibiometric fusion to mitigate the effects of body weight variations in face recognition
  35. Pankaj Shivdayal Wasnik, Kiran Raja, Raghavendra Ramachandra, Christoph Busch (2016). ‘Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones’
  36. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2017). Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters
  37. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Assessing Face Image Quality for Smartphone based Face Recognition System
  38. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones


E-mail:            geir.dyrkolbotn@ntnu.no
Homepage:    http://www.ntnu.edu/employees/geir.dyrko…

Students supervised:

  • Sergii Banin, 2016-2019: ‘Advanced Machine Learning Techniques in Malware Analysis Applications’


E-mail:            martin.eian@ntnu.no
Homepage:    https://www.ntnu.edu/employees/martin.ei…

Students supervised:

Publications co-authored with COINS students:

  1. Siri Bromander, Audun Jøsang, Martin Eian (2016). Semantic Cyberthreat Modelling


E-mail:            katrin.franke@ntnu.no
Homepage:    http://www.kyfranke.com/

Students supervised:

  • Andrii Shalaginov, 2013-2018: ‘Application of soft computing for information security’
  • Takashi Watanabe, 2009-2017: ‘Preventing side-channel information leakage from display unit (employer: Hitachi)’
  • Ambika Chitrakar, 2014-2019: ‘Approximate search techniques for big data analysis’
  • Yi-Ching Liao, 2013-2016: ‘Process tracking for forensic readiness in OS’
  • Siri Bromander, 2016-2020: ‘TOCSA (employer: Mnemonic)’
  • Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’
  • Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’
  • Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’
  • Kyle Porter, 2017-2021: ‘Detecting Dynamic Attack Patterns in Large and Diverse Data Sources’

Publications co-authored with COINS students:

  1. Andrii Shalaginov, Katrin Franke (2013). Automatic rule-mining for malware detection employing Neuro-Fuzzy Approach
  2. Andrii Shalaginov, Katrin Franke (2015). A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications
  3. Andrii Shalaginov, Katrin Franke (2015). A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection
  4. Andrii Shalaginov, Katrin Franke (2015). Automated generation of fuzzy rules from large-scale network traffic analysis in Digital Forensics Investigations
  5. Andrii Shalaginov, Katrin Franke (2015). Generation of the human-understandable fuzzy rules from large-scale datasets for Digital Forensics applications using Neuro-Fuzzy
  6. Andrii Shalaginov, Katrin Franke (2015). Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications
  7. Andrii Shalaginov, Katrin Franke (2016). Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps
  8. Andrii Shalaginov, Katrin Franke (2016). Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy
  9. Andrii Shalaginov, Katrin Franke, Xiongwei Huang (2016). Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
  10. Andrii Shalaginov, Lars Strande Grini, Katrin Franke (2016). Understanding Neuro-Fuzzy on a Class of Multinomial Malware Detection Problems
  11. Lars Christian Andersen, Katrin Franke, Andrii Shalaginov (2016). Data-driven Approach to Information Sharing using Data Fusion and Machine Learning for Intrusion Detection
  12. Sergii Banin, Andrii Shalaginov, Katrin Franke (2016). Memory access patterns for malware detection
  13. Andrii Shalaginov, Katrin Franke (2017). Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness
  14. Jan William Johnsen, Katrin Franke (2017). Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks


E-mail:            laura.georg@ntnu.no
Homepage:    https://www.ntnu.edu/employees/laura.geo…

Students supervised:

  • Adam Szekeres, 2016-2019: ‘Human motivation and the security of Internet of Things’


Students supervised:

  • Chris Carr, 2014-2018: ‘Protection in Complex Cyber Systems’
  • Martin Strand, 2013-2017: ‘Fully homomorphic encryption’
  • Herman Galteland, 2015-2019: ‘On the usage of cryptography in malware’
  • Yao Jiang, 2016-2019: ‘Cryptographic Tools for Cloud Security’

Publications co-authored with COINS students:

  1. Herman Galteland, Kristian Gjøsteen (2016). Malware, Encryption, and Rerandomization – Everything is Under Attack
  2. Herman Galteland, Kristian Gjøsteen (2017). Malware, Encryption, and Rerandomization – Everything is Under Attack


Students supervised:

  • Håkon Jacobsen, 2012-2017: ‘Constructing Efficient Multivariate and Code-based Public-Key Algorithm’
  • Dijana Vukovic, 2013-2017: ‘Increasing the performance, robustness, reliability and security of web services’
  • Simona Samardjiska, 2010-2015: ‘Multivariate Public Key Algorithms Produced by Quasigroups’
  • Maria B Line, 2011-2015: ‘Managing information security incidents in Smart Grid environments (employer: SINTEF IKT)’

Publications co-authored with COINS students:

  1. Simona Samardjiska, Smile Markovski, Danilo Gligoroski (2010). Multivariate Quasigroups Defined by T-functions
  2. Smile Markovski, Simona Samardjiska, Danilo Gligoroski, Svein Johan Knapskog (2010). Multivariate Trapdoor Functions Based on Multivariate Left Quasigroups and Left Polynomial Quasigroups
  3. Danilo Gligoroski, Simona Samardjiska (2011). The Public Key Encryption Scheme MQQ-ENC
  4. Danilo Gligoroski, Svein Johan Knapskog, Simona Samardjiska (2011). The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies
  5. Simona Samardjiska, Danilo Gligoroski (2011). Identity-Based Identification Schemes Using Left Multivariate Quasigroups
  6. Simona Samardjiska, Danilo Gligoroski (2011). On a Class of Left MQQs with Degree Invariant to Parastrophy
  7. Simona Samardjiska, Danilo Gligoroski (2011). On a Class of Left MQQs with Degree Invariant to Parastrophy
  8. Simona Samardjiska, Yanling Chen, Danilo Gligoroski (2011). Construction of Multivariate Quadratic Quasigroups (MQQs) in Arbitrary Galois Fields
  9. Danilo Gligoroski, Simona Samardjiska (2012). The Multivariate Probabilistic Encryption Scheme MQQ-ENC
  10. Danilo Gligoroski, Simona Samardjiska (2012). The Multivariate Probabilistic Encryption Scheme MQQ-ENC
  11. Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski (2012). On the strong and weak keys in MQQ-SIG
  12. Simona Samardjiska, Danilo Gligoroski (2012). Left MQQs whose left parastrophe is also quadratic
  13. Simona Samardjiska, Danilo Gligoroski (2012). Towards a Secure Multivariate Identity-Based Encryption
  14. Simona Samardjiska, Danilo Gligoroski (2012). Towards a secure Multivariate Identity-Based Encryption
  15. Simona Samardjiska, Yanling Chen, Danilo Gligoroski (2012). Algorithms for construction of multivariate quadratic quasigroups (MQQs) and their parastrophe operations in arbitrary Galois fields
  16. Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev (2013). McEliece in the world of Escher
  17. Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev (2013). McEliece in the world of Escher
  18. Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski (2013). On the strong and weak keys in MQQ-SIG
  19. Simona Samardjiska, Danilo Gligoroski (2013). On a Class of Quadratic Permutation Polynomials Over F_(2^n)
  20. Simona Samardjiska, Danilo Gligoroski (2013). On a Class of Quadratic Permutation and Quasigroup Polynomials Over Finite Fields of Characteristic 2
  21. Simona Samardjiska, Danilo Gligoroski (2013). Towards a Characterization of Left Quasigroup Polynomials of Small Degree Over Fields of Characteristic 2
  22. Simona Samardjiska, Danilo Gligoroski (2013). Towards a secure Multivariate Identity-Based Encryption
  23. Danilo Gligoroski, Simona Samardjiska (2014). iSHAKE: Incremental Hashing With SHAKE128 and SHAKE256 for the Zettabyte Era
  24. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy (2014). CAESAR candidate PiCipher
  25. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed Ezzat El Hadedy Aly (2014). Pi-Cipher: Authenticated Encryption for Big Data
  26. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2014). Improvement Proposal for the CryptoCloak Application
  27. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2014). On Privacy Protection in the Internet Surveillance Era
  28. Dijana Vukovic, Zoran Djuric, Danilo Gligoroski (2014). CryptoCloak – Improvement Proposal Implementation
  29. Dijana Vukovic, Zoran Djuric, Danilo Gligoroski (2014). CryptoCloak application – main idea, an overview and improvement proposal
  30. Simona Samardjiska, Danilo Gligoroski (2014). Linearity Measures for Multivariate Public Key Cryptography
  31. Britta Hale, Christopher Alan Carr, Danilo Gligoroski (2015). CARIBE-S: A Cascaded IBE Scheme for Maximum Flexibility and User-side Control
  32. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric (2015). CryptoCloak Protocol and the Prototype Application
  33. Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae (2015). A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
  34. Simona Samardjiska, Danilo Gligoroski (2015). Approaching maximum embedding efficiency on small covers using Staircase-Generator codes
  35. Britta J. Hale, Christopher Carr, Danilo Gligoroski (2016). CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control


E-mail:            poul.heegaard@item.ntnu.no
Homepage:    http://www.item.ntnu.no/people/personalp…

Students supervised:

  • Maria B Line, 2011-2015: ‘Managing information security incidents in Smart Grid environments (employer: SINTEF IKT)’


E-mail:            rune.hjelsvold@ntnu.no
Homepage:    http://www.ntnu.edu/employees/rune.hjels…

Students supervised:

  • Shao-Fang Wen, 2015-2018: ‘Hyper Contextual Information Security Management’


E-mail:            basel.katt@ntnu.no
Homepage:    http://www.ntnu.edu/employees/basel.katt

Students supervised:

  • Felix Schuckert, 2016-2019: ‘Opportunities of Insecurity Refactoring for Training and Software Development (employer: HTWG Konstanz)’


E-mail:            thomas.kemmerich@ntnu.no
Homepage:    http://www.nislab.no/people/norwegian_in…

Students supervised:

  • Håkon Gunleifsen, 2015-2019: ‘A communication model of distributed Network Controllers in a virtualized environment (employer: Eidsiva bredbånd)’

Publications co-authored with COINS students:

  1. Thomas Kemmerich, Vivek Agrawal, Carsten Momsen (2015). Secure migration to the cloud—In and out
  2. Håkon Gunleifsen, Thomas Kemmerich, Slobodan Petrovic (2016). An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization


E-mail:            stewart.kowalski@ntnu.no
Homepage:    https://www.ntnu.no/ansatte/stewart.kowa…

Students supervised:

  • Shao-Fang Wen, 2015-2018: ‘Hyper Contextual Information Security Management’

Publications co-authored with COINS students:

  1. Shao-Fang Wen, Stewart James Kowalski (2017). A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities
  2. Shao-Fang Wen, Stewart James Kowalski (2017). A case study: Heartbleed vulnerability management and Swedish municipalities


E-mail:            okure@ntnu.no
Homepage:    https://www.ntnu.no/ansatte/okure

Students supervised:

  • Desta Haileselassie Hagos, 2015-2019: ‘Machine Learning Techniques for Computer Security Attack Analysis (employer: Høgskolen i Oslo og Akershus)’


E-mail:            hanno.langweg@ntnu.no
Homepage:    http://www.hanno-langweg.de/hanno/

Students supervised:

  • Yi-Ching Liao, 2013-2016: ‘Process tracking for forensic readiness in OS’
  • Felix Schuckert, 2016-2019: ‘Opportunities of Insecurity Refactoring for Training and Software Development (employer: HTWG Konstanz)’

Publications co-authored with COINS students:

  1. Hanno Langweg, Lisa Rajbhandari (2012). Flexible Regulation with Privacy Points
  2. Yi-Ching Liao, Hanno Langweg (2013). A Survey of Process Activity Tracking Systems
  3. Rune Nordvik, Yi-Ching Liao, Hanno Langweg (2014). AccountabilityFS: A File System Monitor for Forensic Readiness
  4. Yi-Ching Liao, Hanno Langweg (2014). Cost-benefit analysis of kernel tracing systems for forensic readiness
  5. Yi-Ching Liao, Hanno Langweg (2014). Process Tracking for Forensic Readiness
  6. Yi-Ching Liao, Hanno Langweg (2014). Resource-Based Event Reconstruction of Digital Crime Scenes
  7. Yi-Ching Liao, Hanno Langweg (2015). Developing Metrics for Surveillance Impact Assessment
  8. Yi-Ching Liao, Hanno Langweg (2015). Events and causal factors charting of kernel traces for root cause analysis
  9. Yi-Ching Liao, Hanno Langweg (2016). Evidential Reasoning for Forensic Readiness


E-mail:            jingyue.li@ntnu.no
Homepage:    https://www.ntnu.edu/employees/jingyue.l…

Students supervised:


E-mail:            khalid@ii.uib.no
Homepage:    http://www.ii.uib.no/~khalid/

Students supervised:

  • Samson Gejibo, 2011-2015: ‘Security Aspects of Mobile Health system’

Publications co-authored with COINS students:

  1. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Jørn Ivar Klungsøyr (2011). Adding Security to Mobile Data Collection
  2. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Data Storage for Java ME-Based Mobile Data Collection Systems
  3. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Data Storage for Mobile Data Collection Systems
  4. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Secure Mobile Data Collection Systems for Low-Budget Settings
  5. Samson Hussien Gejibo, Federico Mancini, Khalid Azim Mughal, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings
  6. Samson Hussien Gejibo, Federico Mancini, Khalid Azim Mughal, Remi André Bognøy Valvik, Jørn Ivar Klungsøyr (2012). Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings
  7. Federico Mancini, Khalid Azim Mughal, Samson Hussien Gejibo, Daniele Grasso (2013). Secure cloud storage for remote mobile data collection
  8. Samson Hussien Gejibo, Khalid Azim Mughal (2015). Towards a Secure Framework for mHealth. A Case Study in Mobile Data Collection Systems


Students supervised:

Publications co-authored with COINS students:

  1. Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski (2017). A Collusion Attack on the Lightning Network — Implications for Forensics
  2. Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski (2017). Digital Forensic Implications of Collusion Attacks on the Lightning Network


E-mail:            slobodan.petrovic@ntnu.no
Homepage:    http://www.ansatt.hig.no/slobodanp/

Students supervised:

  • Takashi Watanabe, 2009-2017: ‘Preventing side-channel information leakage from display unit (employer: Hitachi)’
  • Ambika Chitrakar, 2014-2019: ‘Approximate search techniques for big data analysis’
  • Vasileios Gkioulos, 2014-2018: ‘Distributed security policy mechanisms for tactical Service oriented Architectures’
  • Kyle Porter, 2017-2021: ‘Detecting Dynamic Attack Patterns in Large and Diverse Data Sources’

Publications co-authored with COINS students:

  1. Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
  2. Ambika Shrestha Chitrakar, Slobodan Petrovic (2015). Approximate search with constraints on indels with application in SPAM filtering
  3. Ambika Shrestha Chitrakar, Slobodan Petrovic (2016). Constrained Row-Based Bit-Parallel Search in Intrusion Detection
  4. Håkon Gunleifsen, Thomas Kemmerich, Slobodan Petrovic (2016). An End-to-End Security Model of Inter-Domain Communication in Network Function Virtualization


Students supervised:

  • Kiran Bylappa Raja, 2013-2016: ‘Smartphone Based Hand Biometrics’
  • Martin Stokkenes, 2015-2018: ‘Secure and Privacy Preserving Biometrics for Transaction Authentication’
  • Pankaj Wasnik, 2016-2019: ‘Presentation Attack Detection for Smartphone Based Biometric Authentication System’

Publications co-authored with COINS students:

  1. Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
  2. Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
  3. Kiran Bylappa Raja, Rachamandra Raghavendra, Christoph Busch, Soumik Mondal (2014). An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum
  4. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Fusion of Face and Periocular Information for Improved Authentication on Smartphones
  5. Kiran Bylappa Raja, Rachamandra Raghavendra, Martin Stokkenes, Christoph Busch (2015). Multi-modal Authentication System for Smartphones Using Face, Iris and Periocular
  6. Martin Stokkenes, Raghavendra Ramachandra, Christoph Busch (2016). ‘Authentication protocols for biometric identity on smartphones – An overview’
  7. Martin Stokkenes, Raghavendra Ramachandra, Kiran B. Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2016). ‘Multi-Biometric Template Protection on Smartphones: An Approach based on Binarized Statistical Features and Bloom Filters’
  8. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Ramachandra Raghavendra, Christoph Busch (2016). Eye region based multibiometric fusion to mitigate the effects of body weight variations in face recognition
  9. Pankaj Shivdayal Wasnik, Kiran Raja, Raghavendra Ramachandra, Christoph Busch (2016). ‘Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones’
  10. Martin Stokkenes, Raghavendra Ramachandra, Kiran Bylappa Raja, Morten Sigaard, Marta Gomez-Barrero, Christoph Busch (2017). Multi-biometric template protection on smartphones: An approach based on binarized statistical features and bloom filters
  11. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Assessing Face Image Quality for Smartphone based Face Recognition System
  12. Pankaj Shivdayal Wasnik, Kiran Bylappa Raja, Raghavendra Ramachandra, Christoph Busch (2017). Presentation Attack Detection in Face Biometric Systems Using Raw Sensor Data from Smartphones


E-mail:            einar.snekkenes@ntnu.no
Homepage:    https://www.ansatt.hig.no/einars/

Students supervised:

  • Lisa Rajbhandari, 2010-2013: ‘Risk Analysis Using “Conflicting Incentives” as an Alternative Notion of Risk’
  • Kashif Habib Sheikh, 2012-2017: ‘Risk-based adaptive security for internet of things in eHealth (employer: NR)’
  • Ebenezer Paintsil, 2010-2013: ‘Privacy and Security Risks Analysis in Identity Management Systems (employer: NR)’
  • Pankaj Pandey, 2012-2016: ‘Using Theories from Economics and Finance to Address Information Security Risk Management’
  • Waqas Aman, 2012-2016: ‘Context Aware Risk Analysis for Adaptive Security in Internet of Things’
  • Gaute Wangen, 2013-2017: ‘Conflicting Incentives Risk Analysis’
  • Vivek Agrawal, 2014-2017: ‘Cloud Based Conflicting Incentives risk analysis’
  • Seraj Fayyad, 2014-2018: ‘Measurable Security for Sensors in the Internet of People, Things and Services (IoPTS)’
  • Adam Szekeres, 2016-2019: ‘Human motivation and the security of Internet of Things’

Publications co-authored with COINS students:

  1. Lisa Rajbhandari, Einar Snekkenes (2011). An Approach to Measure Effectiveness of Control for Risk Analysis with Game Theory
  2. Lisa Rajbhandari, Einar Snekkenes (2011). Mapping between Classical Risk Management and Game Theoretical Approaches
  3. Lisa Rajbhandari, Einar Snekkenes (2011). Using Game Theory to Analyze Risk to Privacy: An Initial Insight
  4. Lisa Rajbhandari, Einar Snekkenes (2011). Using Game Theory to Analyze Risk to Privacy: An Initial Insight
  5. Lisa Rajbhandari, Einar Snekkenes (2012). Intended Actions: Risk Is Conflicting Incentives
  6. Ebenezer Paintsil, Lothar Fritsch, Einar Snekkenes (2013). Privacy and Security Risks Analysis of Identity Management Systems
  7. Gaute Wangen, Einar Snekkenes (2013). A Taxonomy of Challenges in Information Security Risk Management
  8. Lisa Rajbhandari, Einar Snekkenes (2013). Case Study Role Play for Research and Training
  9. Lisa Rajbhandari, Einar Snekkenes (2013). Case Study Role Play for Risk Analysis Research and Training
  10. Lisa Rajbhandari, Einar Snekkenes (2013). Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis
  11. Lisa Rajbhandari, Einar Snekkenes (2013). Using the Conflicting Incentives Risk Analysis Method
  12. Pankaj Pandey, Einar Snekkenes (2013). A Framework for Comparison and Analysis of Information Security Investment Models
  13. Waqas Aman, Einar Snekkenes (2013). An Empirical Research on InfoSec Risk Management in IoT-based eHealth
  14. Gaute Wangen, Einar Snekkenes (2014). A Comparison between Business Process Management and Information Security Management
  15. Pankaj Pandey, Einar Snekkenes (2014). An Assessment of Market Methods for Information Security Risk Management
  16. Pankaj Pandey, Einar Snekkenes (2014). Applicability of Prediction Markets in Information Security Risk Management
  17. Pankaj Pandey, Einar Snekkenes (2014). Using Prediction Markets to Hedge Information Security Risks
  18. Pankaj Pandey, Einar Snekkenes (2014). Using prediction markets to hedge information security risks
  19. Waqas Aman, Einar Snekkenes (2014). Event Driven Adaptive Security in Internet of Things
  20. Pankaj Pandey, Einar Snekkenes (2015). A Performance Assessment Metric for Information Security Financial Instruments
  21. Pankaj Pandey, Einar Snekkenes (2015). Design and Performance Aspects of Information Security Prediction Markets for Risk Management
  22. Waqas Aman, Einar Snekkenes (2015). EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things
  23. Waqas Aman, Einar Snekkenes (2015). Managing Security Trade-offs in the Internet of Things using Adaptive Security
  24. Pankaj Pandey, Einar Snekkenes (2016). Using Financial Instruments to Transfer the Information Security Risks
  25. Gaute Wangen, Christoffer V Hallstensen, Einar Arthur Snekkenes (2017). A framework for estimating information security risk assessment method completeness: Core Unified Risk Framework
  26. Vivek Agrawal, Einar Arthur Snekkenes (2017). An Investigation of Knowledge Sharing Behaviors of Students on an Online Community of Practice
  27. Vivek Agrawal, Einar Arthur Snekkenes (2017). Factors Affecting the Willingness to Share Knowledge in the Communities of Practice
  28. Vivek Agrawal, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes (2017). Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice


E-mail:            tyssedal@stat.ntnu.no
Homepage:    http://www.math.ntnu.no/~tyssedal/

Students supervised:

  • Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’

Publications co-authored with COINS students:

  1. Kjetil Kjernsmo, John Sølve Tyssedal (2013). Introducing Statistical Design of Experiments to SPARQL Endpoint Evaluation
  2. Kjetil Kjernsmo, John Sølve Tyssedal (2013). Introducing Statistical Design of Experiments to SPARQL Endpoint Evaluation


E-mail:            thomas.walmann@ntnu.no
Homepage:    http://www.ntnu.edu/employees/thomas.wal…

Students supervised:

  • Jan William Johnsen, 2016-2020: ‘Data Mining and Network Analysis for Financial Crime Detection and Investigation’


E-mail:            stephen.wolthusen@ntnu.no
Homepage:    http://www.wolthusen.com/

Students supervised:

  • Goitom Weldehawaryat, 2011-2017: ‘Resilient Consensus, Interdependencies, and Optimisation in Sparse Networks’
  • Vasileios Gkioulos, 2014-2018: ‘Distributed security policy mechanisms for tactical Service oriented Architectures’

Publications co-authored with COINS students:

  1. Goitom Weldehawaryat, Stephen Wolthusen (2013). Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs
  2. Goitom Weldehawaryat, Stephen Wolthusen (2014). Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence
  3. Goitom Weldehawaryat, Stephen Wolthusen (2015). Modelling Interdependencies over Incomplete Join Structures of Power Law Networks
  4. Goitom Weldehawaryat, Stephen Wolthusen (2015). Secure distributed demand projection in micro-grids
  5. Vasileios Gkioulos, Stephen Wolthusen (2015). Enabling Dynamic Security Policy Evaluation for Service-Oriented Architectures in Tactical Networks
  6. Vasileios Gkioulos, Stephen Wolthusen (2016). Efficient security policy reconciliation in tactical service oriented architectures
  7. Vasileios Gkioulos, Stephen D. Wolthusen (2016). Securing Tactical Service Oriented Architectures
  8. Vasileios Gkioulos, Stephen Wolthusen, Athanasios Iossifides (2016). A Survey on the Security Vulnerabilities of Cellular Communication Systems (GSM-UMTS-LTE)
  9. Vasileios Gkioulos, Stephen Wolthusen, Adam Flizikowski, Anna Stachowicz, Dariusz Nogalski, Kamil Gleba, Joanna Sliwa (2016). Interoperability of security and quality of Service Policies Over Tactical SOA
  10. Goitom Kahsay Weldehawaryat, Pacome L. Ambassa, Anesu M.C. Marufu, Stephen Wolthusen, Anne V.D.M. Kayem (2017). Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security
  11. Vasileios Gkioulos, Stephen Wolthusen (2017). A Security Policy Infrastructure for Tactical Service Oriented Architectures
  12. Vasileios Gkioulos, Stephen Wolthusen (2017). A security policy infrastructure for tactical service oriented architectures
  13. Vasileios Gkioulos, Stephen Wolthusen (2017). Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
  14. Vasileios Gkioulos, Stephen Wolthusen (2017). Security Infrastructure for Service Oriented Architectures at the Tactical Edge. Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2017
  15. Vasileios Gkioulos, Stephen Wolthusen (2017). Security Requirements for the Deployment of Services Across Tactical SOA, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017
  16. Vasileios Gkioulos, Stephen Wolthusen, Erko Risthein (2017). TACTICS: Validation of the security framework developed for tactical SOA, Journal of Information Security and Applications


E-mail:            bian.yang@ntnu.no
Homepage:    https://sites.google.com/site/bianyangsi…

Students supervised:

  • Edlira Martiri, 2012-2017: ‘Template protection for multi-biometrics (employer: University of Tirana)’
  • Guoqiang Li, 2012-2016: ‘Biometric indexing’

Publications co-authored with COINS students:

  1. Bian Yang, Lisa Rajbhandari, Christoph Busch, Xuebing Zhou (2012). Privacy Implications of Identity References in Biometrics Databases
  2. Guoqiang Li, Bian Yang, Rachamandra Raghavendra, Christoph Busch (2012). Testing Mobile Phone Camera Based Fingerprint Recognition under Real-Life Scenarios
  3. Bian Yang, Guoqiang Li, Christoph Busch (2013). Qualifying fingerprint samples captured by smartphone cameras
  4. Guoqiang Li, Bian Yang, Christoph Busch (2013). Autocorrelation and DCT based quality metrics for fingerprint samples generated by smartphones
  5. Guoqiang Li, Bian Yang, Christoph Busch (2013). Lightweight Quality Metrics for Smartphone Camera based Fingerprint Samples
  6. Guoqiang Li, Bian Yang, Martin Aastrup Olsen, Christoph Busch (2013). Quality Assessment for Fingerprints Collected by Smartphone Cameras
  7. Rachamandra Raghavendra, Kiran Bylappa Raja, Anika Pflug, Bian Yang, Christoph Busch (2013). 3D face reconstruction and multimodal person identification from video captured using smartphone camera
  8. Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch (2014). Cloud Password Manager Using Privacy-Preserved Biometrics
  9. Guoqiang Li, Bian Yang, Christoph Busch (2014). A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code
  10. Guoqiang Li, Christoph Busch, Bian Yang (2014). A novel approach used for measuring fingerprint orientation of arch fingerprint
  11. Bian Yang, Edlira Nepravishta Martiri (2015). Using Honey Templates to Augment Hash Based Biometric Template Protection
  12. Edlira Nepravishta Martiri, Bian Yang, Christoph Busch (2015). Protected Honey Face Templates
  13. Guoqiang Li, Bian Yang, Christoph Busch (2015). A Fingerprint Indexing Scheme with Robustness against Sample Translation and Rotation
  14. Guoqiang Li, Bian Yang, Christoph Busch (2015). A Novel Fingerprint Indexing Approach Focusing on Minutia Location and direction
  15. Guoqiang Li, Bian Yang, Christian Rathgeb, Christoph Busch (2015). Towards generating protected fingerprint templates based on bloom filters
  16. Edlira Martiri, Marta Gomez-Barrero, Bian Yang, Christoph Busch (2016). Biometric template protection based on Bloom filters and honey templates
  17. Guoqiang Li, Bian Yang, Christoph Busch (2016). A Fingerprint Indexing Algorithm on Encrypted Domain


E-mail:            andre.arnes@ntnu.no
Homepage:    http://www.ntnu.edu/employees/andre.arne…

Students supervised:

  • Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’

University of Agder


E-mail:            geir.koien@uia.no
Homepage:    http://www.uia.no/kk/profil/geirk

Students supervised:

Publications co-authored with COINS students:

  1. Nils Ulltveit-Moe, Vladimir A Oleshchuk, Geir M. Køien (2011). Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
  2. Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir Myrdahl Køien, Vladimir Oleshchuk (2013). Privacy handling for critical information infrastructures
  3. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2014). Security and Privacy in the Internet of Things: Current Status and Open Issues
  4. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks
  5. Mohamed Ali Saleh Abomhara, Martin Gerdes, Geir Myrdahl Køien (2015). A STRIDE-Based Threat Model for Telehealth Systems
  6. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien (2016). Towards an Access Control Model for Collaborative Healthcare Systems
  7. Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien (2016). Access Control Model for Cooperative Healthcare Environments: Modeling and Verification
  8. Mohamed Ali Saleh Abomhara, Huihui Yang, Geir Myrdahl Køien, Mehdi Ben Lazreg (2017). Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification


E-mail:            Vladimir.Oleshchuk@uia.no
Homepage:    http://www.uia.no/en/div/project/systems…

Students supervised:

  • Nils Ulltveit-Moe, 2009-2014: ‘Privacy Enhanced Network Monitoring’
  • Huihui Yang, 2012-2016: ‘Privacy Policies for Online Services’
  • Berglind Smaradottir, 2010-2016: ‘Usability evaluation and security management of health care information systems’
  • Joseph Twayigira, 2013-2017: ‘Using Mobile Cloud Computing for Crisis and Emergency Management: Securty and Privacy Aspects (employer: University of Rwanda)’
  • Harsha Sandaruwan Gardiyawasam Pussewalage, 2015-2018: ‘Attribute based Methods to Enforce Security and Privacy in E-health Solutions’

Publications co-authored with COINS students:

  1. Vladimir Oleshchuk, Nils Ulltveit-Moe (2009). Two Tiered Privacy Enhanced Intrusion Detection System Architecture
  2. Nils Ulltveit-Moe, Vladimir Oleshchuk (2010). PRIvacy LEakage Methodology (PRILE) for IDS Rules
  3. Nils Ulltveit-Moe, Vladimir Oleshchuk (2010). Privacy Violation Classification of Snort Ruleset
  4. Vladimir Oleshchuk, Nils Ulltveit-Moe (2010). PRIvacy LEakage Methodology (PRILE) for IDS rules
  5. Nils Ulltveit-Moe, Vladimir Oleshchuk (2011). A Composite Privacy Leakage Indicator
  6. Nils Ulltveit-Moe, Vladimir A Oleshchuk, Geir M. Køien (2011). Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
  7. Nils Ulltveit-Moe, Vladimir Oleshchuk (2012). Decision-cache based XACML authorisation and anonymisation for XML documents
  8. Nils Ulltveit-Moe, Vladimir Oleshchuk (2012). Mobile Security with Location-Aware Role-Based Access Control
  9. Nils Ulltveit-Moe, Vladimir Oleshchuk (2013). Measuring privacy leakage for IDS rules
  10. Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir Myrdahl Køien, Vladimir Oleshchuk (2013). Privacy handling for critical information infrastructures
  11. Huihui Yang, Vladimir Oleshchuk (2014). An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
  12. Huihui Yang, Jiao Lei, Vladimir Oleshchuk (2014). A General Framework for Group Authentication and Key Exchange Protocols
  13. Joseph Twayigira, Vladimir Oleshchuk (2014). User authentication in mobile cloud-based crisis and emergency management
  14. Huihui Yang, Vladimir Oleshchuk (2015). A dynamic attribute-based authentication scheme
  15. Huihui Yang, Vladimir Oleshchuk (2015). ATTRIBUTE-BASED AUTHENTICATION SCHEMES: A SURVEY
  16. Huihui Yang, Vladimir Oleshchuk (2015). An efficient traceable attribute-based authentication scheme with one-time attribute trees
  17. Huihui Yang, Vladimir Oleshchuk (2015). Traceable hierarchical attribute-based authentication for the cloud
  18. Berglind Smaradottir, Rune Werner Fensli, Vladimir Oleshchuk (2016). User-centred Design and Evaluation of Health Information Technology : Doctoral Dissertation for the Degree Philosophiae Doctor (PhD) in Information and Communication Technology
  19. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
  20. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). An attribute based access control scheme for secure sharing of electronic health records
  21. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2016). Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
  22. Harsha Gardiyawasam Pussewalage, Pasika Ranaweera, Vladimir Oleshchuk, Indika A.M. Balapuwaduge (2016). Secure Multi-party based Cloud Computing Framework for Statistical Data Analysis of Encrypted Data
  23. Huihui Yang, Andreas Prinz, Vladimir Oleshchuk (2016). Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
  24. Huihui Yang, Vladimir Oleshchuk, Andreas Prinz (2016). Verifying group authentication protocols by Scyther
  25. Harsha Gardiyawasam Pussewalage, Vladimir Oleshchuk (2017). Attribute Based Access Control Scheme with Controlled Access Delegation for Collaborative E-health Environments

University of Bergen


E-mail:            Lilya.Budaghyan@ii.uib.no
Homepage:    http://www.uib.no/personer/Lilya.Budaghy…

Students supervised:

  • Bo Sun, 2013-2017: ‘Cloud Computing Security’
  • Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’
  • Irene Villa, 2016-2020: ‘Optimal Boolean Functions’
  • Nikolay Kaleyski, 2017-2021: ‘Properties of optimal Boolean functions’

Publications co-authored with COINS students:

  1. Lilya Budaghyan, Oleksandr Kazymyrov (2012). Verification of Restricted EA-Equivalence for Vectorial Boolean Functions
  2. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions


E-mail:            Tor.Helleseth@ii.uib.no
Homepage:    http://www.ii.uib.no/~torh/

Students supervised:

  • Mohsen Toorani, 2011-2015: ‘Security protocols and related topics’
  • Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’
  • Chunlei Li, 2010-2014: ‘Secure Boolean Functions for Coding and Cryptography’
  • Stian Fauskanger, 2014-2017: ‘New properties of DES and linear cryptanalysis of lightweight cipher with multiple linear approximations (employer: FFI)’
  • Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
  • Navid Ghaedi Bardeh, 2016-2019: ‘Cryptanalysis of Symmetric Cryptographic Primitives’
  • Andrea Tenti, 2016-2019: ‘Analysis of Macaulay matrices over finite fields’

Publications co-authored with COINS students:

  1. Chunlei Li, Tor Helleseth (2012). New Nonbinary Sequence Families with Low Correlation and Large Linear Span
  2. Chunlei Li, Tor Helleseth (2012). New nonbinary sequence families with low correlation and large linear span
  3. Guang Gong, Tor Helleseth, Honggang Hu, Chunlei Li (2012). New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences
  4. Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Chunlei Li (2012). A class of binomial bent functions over the finite fields of odd characteristic
  5. Tor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosa (2013). State space cryptanalysis of the MICKEY cipher
  6. Wenjie Jia, Xiangyong Zeng, Chunlei Li, Tor Helleseth, Lei Hu (2013). Permutation polynomials with low differential uniformity over finite fields of odd characteristic
  7. Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth (2014). A class of de Bruijn sequences
  8. Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu (2014). The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
  9. Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding (2014). The weight distributions of several classes of cyclic codes from APN monomials
  10. Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang (2014). Optimal ternary cyclic codes with minimum distance four and five
  11. Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth (2014). Some results on cross-correlation distribution between a p-Ary m-sequence and its decimated sequences
  12. Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li (2014). Cross-correlation between a p-ary m-sequence and its all decimated sequences for d = (pm+1)(pm+p-1)/p+1
  13. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions


E-mail:            kjellh@ii.uib.no
Homepage:    http://www.uib.no/persons/kjellh

Students supervised:

  • Tetiana Yarygina, 2013-2018: ‘Robust and secure cloud services’
  • Christian Otterstad, 2013-2017: ‘Low-level exploitation mitigation through dynamic code mutation and selected low-level attacks’

Publications co-authored with COINS students:

  1. Olav Lysne, Kjell Jørgen Hole, Christian W. Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jørgen Tellnes (2016). Vendor malware: detection limits and mitigation
  2. Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole (2017). Selected x86 Low-level Attacks and Mitigations


Students supervised:

  • Oleksandr Kazymyrov, 2011-2014: ‘Generation Methods of Basic Components for Symmetric Cryptosystems’

Publications co-authored with COINS students:

  1. Tor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosa (2013). State space cryptanalysis of the MICKEY cipher


E-mail:            Nian.Li@uib.no
Homepage:    https://www.researchgate.net/profile/Nia…

Students supervised:

  • Bo Sun, 2013-2017: ‘Cloud Computing Security’

Publications co-authored with COINS students:

  1. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun (2017). Some Results on the Known Classes of Quadratic APN Functions


E-mail:            Federico.Mancini@ffi.no
Homepage:    http://www.ii.uib.no/~federico/

Students supervised:


E-mail:            haavardr@ii.uib.no
Homepage:    http://www.uib.no/info/dr_grad/2005/Radd…

Students supervised:

  • Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
  • Srimathi Varadharajan, 2015-2019: ‘Application of BDD to Cryptography’


E-mail:            Eirik.Rosnes@uib.no
Homepage:    http://www.uib.no/en/persons/Eirik.Rosne…

Students supervised:

  • Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’


E-mail:            Sondre.Ronjom@uib.no
Homepage:    https://no.linkedin.com/in/sondre-r%C3%B…

Students supervised:


E-mail:            Igor.Semaev@ii.uib.no
Homepage:    http://www.uib.no/persons/Igor.Semaev

Students supervised:

  • Stian Fauskanger, 2014-2017: ‘New properties of DES and linear cryptanalysis of lightweight cipher with multiple linear approximations (employer: FFI)’
  • Andrea Tenti, 2016-2019: ‘Analysis of Macaulay matrices over finite fields’
  • Isaac Canales Martinez, 2017-2020: ‘Algebraic analysis of Stream ciphers’
  • Alessandro Budroni, 2017-2021: ‘Cryptoanalysis on LWE’

Publications co-authored with COINS students:

  1. Stian Fauskanger, Igor A. Semaev (2015). Statistical and Algebraic Properties of DES
  2. Stian Fauskanger, Igor A. Semaev (2016). Statistical and Algebraic Properties of DES


E-mail:            oyvind@ii.uib.no
Homepage:    http://www.ii.uib.no/~oyvind/

Students supervised:

  • Mohsen Toorani, 2011-2015: ‘Security protocols and related topics’
  • Christian Otterstad, 2013-2017: ‘Low-level exploitation mitigation through dynamic code mutation and selected low-level attacks’
  • Bjørn Greve, 2015-2018: ‘Secure and low voice communication, and other cryptographic aspects (employer: FFI, NSM)’
  • Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’

Publications co-authored with COINS students:

  1. Mohsen Toorani, Øyvind Ytrehus (2015). Security protocols and related topics
  2. Olav Lysne, Kjell Jørgen Hole, Christian W. Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jørgen Tellnes (2016). Vendor malware: detection limits and mitigation
  3. Christian W. Otterstad, Øyvind Ytrehus, Kjell Jørgen Hole (2017). Selected x86 Low-level Attacks and Mitigations

University of Oslo


E-mail:            l.a.bygrave@jus.uio.no
Homepage:    http://www.jus.uio.no/ifp/english/people…

Students supervised:

  • Samson Yoseph Esayas, 2015-2018: ‘Data Privacy and Competition Law in the Age of Big Data: The Commercialization of Personal Data and its Theoretical and Practical Implications on the Foundations and Policy Boundaries of Data Privacy Law and Competition Law’
  • Worku Gedefa Urgessa, 2017-2020: ‘The Role of IGOs and International Law in Securing Cyberspace’
  • Luca Tosoni, 2017-2020: ‘Regulating Cybersecurity: Challenges, Limits and Regulatory Options’


E-mail:            frank@ifi.uio.no
Homepage:    http://folk.uio.no/frank/

Students supervised:

  • Dat Le Tien, 2014-2018: ‘Trade-off between performance and security in networked systems’


E-mail:            paal.engelstad@hioa.no
Homepage:    http://www.mn.uio.no/ifi/personer/vit/pa…

Students supervised:

  • Ashish Rauniyar, 2016-2020: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’
  • Desta Haileselassie Hagos, 2015-2019: ‘Machine Learning Techniques for Computer Security Attack Analysis (employer: Høgskolen i Oslo og Akershus)’
  • Ramtin Aryan, 2016-2020: ‘Software-Defined Networking Policy Conflict Detection: a holistic approach (employer: Høgskolen i Oslo og Akershus)’


E-mail:            martingi@ifi.uio.no
Homepage:    http://heim.ifi.uio.no/martingi/

Students supervised:

  • Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’


E-mail:            cristi@ifi.uio.no
Homepage:    http://heim.ifi.uio.no/~cristi/index.sht…

Students supervised:

  • Manish Shrestha, 2016-2019: ‘Measurable security and privacy for services on the Smart Electricity Grid’
  • Siri Bromander, 2016-2020: ‘TOCSA (employer: Mnemonic)’
  • Elahe Fazeldehkordi, 2017-2020: ‘Semantic Modelling and Measuring of Privacy for IoT in Smart Home’
  • Hamed Arshad, 2017-2020: ‘Attribute Based Access Control’

Publications co-authored with COINS students:

  1. Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
  2. Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things


E-mail:            josang@mn.uio.no
Homepage:    http://folk.uio.no/josang/

Students supervised:

  • Ijlal Loutfi, 2014-2018: ‘Secure and Robust Network-based Systems’
  • Antonio Gonzalez Burgueño, 2014-2018: ‘Formal analysis for security ceremonies’
  • Dat Le Tien, 2014-2018: ‘Trade-off between performance and security in networked systems’
  • Vasileios Mavroeidis, 2016-2019: ‘Cyberthreat Detection and Analysis’
  • Siri Bromander, 2016-2020: ‘TOCSA (employer: Mnemonic)’
  • Kamer Vishi, 2016-2019: ‘Multimodal Biometrics in Identity and Access Management (IAM)’

Publications co-authored with COINS students:

  1. Siri Bromander, Audun Jøsang, Martin Eian (2016). Semantic Cyberthreat Modelling


E-mail:            josef@unik.no
Homepage:    http://jnoll.net/

Students supervised:

  • Seraj Fayyad, 2014-2018: ‘Measurable Security for Sensors in the Internet of People, Things and Services (IoPTS)’
  • Manish Shrestha, 2016-2019: ‘Measurable security and privacy for services on the Smart Electricity Grid’
  • Maghsoud Morshedi Chinibolagh, 2017-2021: ‘Application specific routing for managed wireless access (employer: EyeNetworks)’

Publications co-authored with COINS students:

  1. Seraj Fayyad, Josef Noll (2014). Security and Safety Composition Methodology
  2. Seraj Fayyad, Josef Noll (2014). Toward Real Time IT Risk Assessment Methodology
  3. Iñaki Garitano, Seraj Fayyad, Josef Noll (2015). Multi-Metrics Approach for Security, Privacy and Dependability in Embedded Systems
  4. Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie (2015). Measurable Security, Privacy and Dependability in Smart Grids
  5. Seraj Fayyad, Josef Noll (2015). Components Interconnection Consideration In Multi Metrics Approach
  6. Seraj Fayyad, Josef Noll (2015). Components Interconnection Consideration In Multi Metrics Approach
  7. Iren Borgen, Lisa Garnweidner-Holme, Anne Flem Jacobsen, Kirsti Bjerkan, Seraj Fayyad, Pål Joranger, Anne Marie Lilleengen, Annhild Mosdøl, Josef Noll, Milada C Småstuen, Laura Terragni, Liv Elin Torheim, Mirjam Lukasse (2017). Smartphone application for women with gestational diabetes mellitus: a study protocol for a multicentre randomised controlled trial
  8. Seraj Fayyad, Josef Noll (2017). A Framework for Measurability of Security


E-mail:            nils.nordbotten@ffi.no
Homepage:    http://cwi.unik.no/wiki/Nils_Nordbotten

Students supervised:


E-mail:            olaf@ifi.uio.no
Homepage:    http://heim.ifi.uio.no/~olaf

Students supervised:

  • Shukun Tokas, 2016-2020: ‘Security For Communicating Object Systems’
  • Hamed Arshad, 2017-2020: ‘Attribute Based Access Control’
  • Farzane Karami, 2017-2020: ‘Language-Based Security, Addressing Active Object and Distributed Systems’

Publications co-authored with COINS students:

  1. Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
  2. Shukun Tokas, Olaf Owe, Christian Johansen (2017). Code Diversification Mechanisms for Securing the Internet of Things
  3. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
  4. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures


E-mail:            toktamr@ifi.uio.no
Homepage:    http://www.mn.uio.no/ifi/english/people/…

Students supervised:

  • Shukun Tokas, 2016-2020: ‘Security For Communicating Object Systems’

Publications co-authored with COINS students:

  1. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures
  2. Toktam Ramezanifarkhani, Farzane Karami, Olaf Owe (2017). A High-Level Language for Active Objects with Future-Free Support of Futures


E-mail:            ragnhilk@ifi.uio.no
Homepage:    http://www.mn.uio.no/ifi/personer/vit/ra…

Students supervised:

  • Yan Li, 2011-2017: ‘A lightweight security risk management approach for web applications and an industrial guideline (employer: SINTEF IKT)’

Publications co-authored with COINS students:

  1. Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen (2012). Conceptual Framework for the DIAMONDS Project
  2. Yan Li, Ragnhild Kobro Runde, Ketil Stølen (2013). Towards a pattern language for security risk analysis of web applications
  3. Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen (2014). Approaches for the combined use of risk analysis and testing: A systematic literature review


E-mail:            msteffen@ifi.uio.no
Homepage:    http://www.mn.uio.no/ifi/english/people/…

Students supervised:

  • Shukun Tokas, 2016-2020: ‘Security For Communicating Object Systems’


E-mail:            Ketil.Stolen@sintef.no
Homepage:    http://heim.ifi.uio.no/~ketils/

Students supervised:

  • Yan Li, 2011-2017: ‘A lightweight security risk management approach for web applications and an industrial guideline (employer: SINTEF IKT)’

Publications co-authored with COINS students:

  1. Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen (2012). Conceptual Framework for the DIAMONDS Project
  2. Yan Li, Ragnhild Kobro Runde, Ketil Stølen (2013). Towards a pattern language for security risk analysis of web applications
  3. Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen (2014). Approaches for the combined use of risk analysis and testing: A systematic literature review
  4. Katsiaryna Labunets, Yan Li, Fabio Massacci, Federica Paci, Martina Ragosta, Bjørnar Solhaug, Ketil Stølen, Alessandra Tedeschi (2015). Preliminary Experiments on the Relative Comprehensibility of Tabular and Graphical Risk Models


E-mail:            jimtoer@ifi.uio.no
Homepage:    http://folk.uio.no/jimtoer/

Students supervised:

  • Flávia Dias Casagrande, 2016-2019: ‘Self-learning systems for Assisted Living Technologies (employer: Høgskolen i Oslo og Akershus)’


E-mail:            romanvi@ifi.uio.no
Homepage:    http://folk.uio.no/romanvi/

Students supervised:


E-mail:            arild@ifi.uio.no
Homepage:    http://www.mn.uio.no/ifi/personer/vit/ar…

Students supervised:

  • Kjetil Kjernsmo, 2010-2016: ‘Data Profiling in SPARQL Federation Optimizations’


E-mail:            peterol@ifi.uio.no
Homepage:    http://folk.uio.no/peterol/

Students supervised:


E-mail:            i.b.orstavik@jus.uio.no
Homepage:    http://www.jus.uio.no/ifp/personer/vit/i…

Students supervised:

  • Samson Yoseph Esayas, 2015-2018: ‘Data Privacy and Competition Law in the Age of Big Data: The Commercialization of Personal Data and its Theoretical and Practical Implications on the Foundations and Policy Boundaries of Data Privacy Law and Competition Law’

University of Stavanger


Students supervised:

  • Songpu Ai, 2016-2019: ‘Smart Energy System using (Big-)data Analytics and Prognostics’
  • Cristina Heghedus, 2016-2019: ‘Dara driven energy informatics’

Publications co-authored with COINS students:

  1. Tim Majchrzak, Antorweep Chakravorty (2012). Improving the Compliance of Transplantation Medicine Patients with an Integrated Mobile System
  2. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
  3. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  4. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  5. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  6. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  7. Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
  8. Chunming Rong, Quan Zhou, Antorweep Chakravorty (2013). On Access Control Schemes for Hadoop Data Storage
  9. Antorweep Chakravorty (2014). Amerikanere hyller norsk student-idé
  10. Antorweep Chakravorty (2014). Smart eller overvåket?
  11. Antorweep Chakravorty (2014). Spørsmål om Smarthus
  12. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  13. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  14. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  15. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  16. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
  17. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
  18. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  19. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning


E-mail:            chunlei.li@uis.no
Homepage:    https://www.uis.no/om-uis/kontakt-oss/fi…

Students supervised:

Publications co-authored with COINS students:

  1. Chunlei Li, Xiangyong Zeng, Lei Hu (2010). A class of binary cyclic codes with five weights
  2. Houzhen Wang, Chunlei Li (2010). Design theory and method of multivariate hash function
  3. Huanguo Zhang, Chunlei Li, Ming Tang (2011). Capability of evolutionary cryptosystems against differential cryptanalysis
  4. Huanguo Zhang, Chunlei Li, Ming Tang (2011). Evolutionary cryptography against multidimensional linear cryptanalysis
  5. Chunlei Li (2012). The lower bound of the second order nonlinearity of a class of Bent functions
  6. Chunlei Li, Tor Helleseth (2012). New Nonbinary Sequence Families with Low Correlation and Large Linear Span
  7. Chunlei Li, Tor Helleseth (2012). New nonbinary sequence families with low correlation and large linear span
  8. Chunlei Li, Nian Li, Matthew Geoffrey Parker (2012). Complementary sequence pairs of types II and III
  9. Guang Gong, Tor Helleseth, Honggang Hu, Chunlei Li (2012). New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences
  10. Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Chunlei Li (2012). A class of binomial bent functions over the finite fields of odd characteristic
  11. Jie Li, Xiangyong Zeng, Xiaohu Tang, Chunlei Li (2013). A family of quadriphase sequences of period 4(2 n−1)with low correlation and large linear span
  12. Wenjie Jia, Xiangyong Zeng, Chunlei Li, Tor Helleseth, Lei Hu (2013). Permutation polynomials with low differential uniformity over finite fields of odd characteristic
  13. Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth (2014). A class of de Bruijn sequences
  14. Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu (2014). The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
  15. Chunlei Li (2014). Sequences and Linear Codes from Highly Nonlinear Functions
  16. Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding (2014). The weight distributions of several classes of cyclic codes from APN monomials
  17. Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan (2014). Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
  18. Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang (2014). Optimal ternary cyclic codes with minimum distance four and five
  19. Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth (2014). Some results on cross-correlation distribution between a p-Ary m-sequence and its decimated sequences
  20. Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li (2014). Cross-correlation between a p-ary m-sequence and its all decimated sequences for d = (pm+1)(pm+p-1)/p+1


E-mail:            chunming.rong@uis.no
Homepage:    http://www.chunming.net/

Students supervised:

  • Bikash Agrawal, 2013-2016: ‘Secure data storage and sharing in the cloud’
  • Antorweep Chakravorty, 2012-2015: ‘Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes’
  • Aryan TaheriMonfared, 2012-2015: ‘Building Network Security Services Using Software Defined Networking’
  • Songpu Ai, 2016-2019: ‘Smart Energy System using (Big-)data Analytics and Prognostics’
  • Jayachander Surbiryala, 2016-2019: ‘Information Security in Cloud Computing’
  • Cristina Heghedus, 2016-2019: ‘Dara driven energy informatics’

Publications co-authored with COINS students:

  1. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
  2. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  3. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  4. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  5. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  6. Aryan TaheriMonfared, Chunming Rong (2013). Multi-tenant Network Monitoring Based on Software Defined Networking
  7. Aryan TaheriMonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
  8. Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
  9. Chunming Rong, Quan Zhou, Antorweep Chakravorty (2013). On Access Control Schemes for Hadoop Data Storage
  10. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  11. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  12. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  13. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  14. Aryan TaheriMonfared, Chunming Rong (2014). Flexible Building Blocks for Software Defined Network Function Virtualization
  15. Aryan TaheriMonfared, Chunming Rong (2014). Flexible Building Blocks for Software Defined Network Function Virtualization
  16. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
  17. Aryan TaheriMonfared, Chunming Rong (2015). Virtual Network Flavors: Differentiated Traffic Forwarding for Cloud Tenants
  18. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2015). Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model
  19. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
  20. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics
  21. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). Data Mining Workshop (ICDMW), 2015 IEEE International Conference on
  22. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2016). Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis
  23. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  24. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  25. Bikash Agrawal, Raymond Hansen, Rong Chunming, Tomasz Wiktorski (2016). SD-HDFS: Secure Deletion in Hadoop Distributed File System
  26. Bikash Agrawal, Jayachander Surbiryala, Rong Chunming (2017). Resource Allocation in Cloud-Based Distributed Cameras


E-mail:            tomasz.w.wlodarczyk@uis.no
Homepage:    http://www.wlodarczyk.eu

Students supervised:

  • Bikash Agrawal, 2013-2016: ‘Secure data storage and sharing in the cloud’

Publications co-authored with COINS students:

  1. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). A MapReduce based K-Anonymization Solution for Sharing of Smart Home Data
  2. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  3. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Privacy Preserving Data Analytics for Smart Homes
  4. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  5. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Safer@Home Analytics: a Big Data Analytical Solution for Smart Homes
  6. Aryan TaheriMonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong (2013). Real-Time Handling of Network Monitoring Data Using a Data-Intensive Framework
  7. Chunming Rong, Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk (2013). A map reduce based K-anonymization solution for sharing of smart home data
  8. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  9. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong (2014). A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  10. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  11. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk (2014). A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  12. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2014). R2Time: a framework to analyse OpenTSDB timeseries data in HBase
  13. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2015). Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model
  14. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk (2015). R2Time: A framework to analyse open TSDB Time-series data in HBase
  15. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). AFFM: Auto feature engineering in field-aware factorization machines for predictive analytics
  16. Lars Ropeid Selsaas, Bikash Agrawal, Rong Chunming, Tomasz Wiktorski (2015). Data Mining Workshop (ICDMW), 2015 IEEE International Conference on
  17. Bikash Agrawal, Tomasz Wiktorski, Rong Chunming (2016). Adaptive Anomaly Detection in Cloud Using Robust and Scalable Principal Component Analysis
  18. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  19. Bikash Agrawal, Antorweep Chakravorty, Tomasz Wiktorski, Rong Chunming (2016). Enrichment of Machine Learning based Activity Classification in Smart Homes using Ensemble Learning
  20. Bikash Agrawal, Raymond Hansen, Rong Chunming, Tomasz Wiktorski (2016). SD-HDFS: Secure Deletion in Hadoop Distributed File System

University of Tromsø


E-mail:            anders.andersen@uit.no
Homepage:    http://www.cs.uit.no/~aa/

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  2. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  3. Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen (2014). Privacy preserving health data processing
  4. Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen (2014). Privacy preserving health data processing


Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
  2. Kassaye Yitbarek Yigzaw, Tore Jarl Gutteberg, Johan Gustav Bellika (2013). The Snow infectious disease forecast service
  3. Kassaye Yitbarek Yigzaw, A Andersen, Gunnar Hartvigsen, Johan Gustav Bellika (2013). Towards privacy preserving comparative effectiveness research
  4. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  5. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  6. Stein Olav Skrøvseth, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Per Atle Bakkevoll, Gunnar Skov Simonsen, Tore Jarl Gutteberg, Johan Gustav Bellika (2013). The Snow communicable disease outbreak detection approach
  7. Johan Gustav Bellika, Torje Dahle Henriksen, Kassaye Yitbarek Yigzaw (2014). The Snow System – a Decentralized Medical Data Processing System
  8. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). A communicable disease prediction benchmarking platform
  9. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). A communicable disease prediction benchmarking platform
  10. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). Evaluation of Secure Multi-Party Computation for Reuse of Distributed Electronic Health Data
  11. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2014). Evaluation of secure multi-party computation for reuse of distributed electronic health data
  12. Luis Marco Ruiz, Pablo Pazos, Koray Atalag, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2015). Enabling Clinical Data Reuse with openEHR Data Warehouse Environments
  13. Meskerem Asfaw Hailemichael, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2015). Emnet: a tool for privacy-preserving statistical computing on distributed health data
  14. Andrius Budrionis, Luis Marco-Ruiz, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Building a Learning Healthcare System in North Norway
  15. Andrius Budrionis, Marco-ruiz Luis, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Building a Learning Healthcare System in North Norway
  16. Kassaye Yitbarek Yigzaw, Antonis Michalas, Johan Gustav Bellika (2016). Secure and scalable statistical computation of questionnaire data in R
  17. Luis Marco Ruiz, Andrius Budrionis, Kassaye Yitbarek Yigzaw, Johan Gustav Bellika (2016). Interoperability Mechanisms of Clinical Decision Support Systems: A Systematic Review


E-mail:            gro.berntsen@uit.no
Homepage:    http://uit.no/om/enhet/ansatte/person?p_…

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system


E-mail:            fred.godtliebsen@uit.no
Homepage:    http://uit.no/om/enhet/ansatte/person?p_…

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system


E-mail:            gunnar.hartvigsen@uit.no
Homepage:    http://mit.cs.uit.no/

Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system
  2. Kassaye Yitbarek Yigzaw, A Andersen, Gunnar Hartvigsen, Johan Gustav Bellika (2013). Towards privacy preserving comparative effectiveness research
  3. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  4. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika, Anders Andersen, Gunnar Hartvigsen, Carlos Fernandez-Llatas (2013). Towards Privacy-Preserving Computing on Distributed Electronic Health Record Data
  5. Daniel Karlsson, Andrius Budrionis, Ann Bygholm, Mariann Fossum, Conceicao Granja, Gunnar Hartvigsen, Ole Hejlesen, Maria Hägglund, Monika Alise Johansen, Lars Lindsköld, Santiago Martinez, Carl Erik Moe, Luis Marco Ruiz, Vivian Vimarlund, Kassaye Yitbarek Yigzaw (2016). Proceedings from The 14th Scandinavian Health Informatics Conference 2016


E-mail:            trygve.johnsen@uit.no
Homepage:    http://uit.no/om/enhet/ansatte/person?p_…

Students supervised:

Publications co-authored with COINS students:

  1. Trygve Johnsen, Jan Nyquist Roksvold, Hugues Verdure (2015). Betti numbers associated to the facet ideal of a matroid


E-mail:            hugues.verdure@uit.no
Homepage:    http://www.math.uit.no/ansatte/hugues/in…

Students supervised:

Publications co-authored with COINS students:

  1. Jan Nyquist Roksvold, Hugues Verdure (2013). The generalized weight polynomial – and how it is determined by Betti-numbers
  2. Trygve Johnsen, Jan Nyquist Roksvold, Hugues Verdure (2015). Betti numbers associated to the facet ideal of a matroid

External supervisors


E-mail:            Habtamu.Abie@nr.no
Homepage:    https://www.nr.no/~abie/

Students supervised:

  • Jens-Petter Sandvik, 2016-2020: ‘Digital forensics and resource-constrained, Internet-connected systems (employer: National Criminal Investigation Service)’

Publications co-authored with COINS students:

  1. Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie (2015). Measurable Security, Privacy and Dependability in Smart Grids


E-mail:            Boning.Feng@hioa.no
Homepage:    https://www.hioa.no/tilsatt/boningf

Students supervised:

  • Ashish Rauniyar, 2016-2020: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’

Publications co-authored with COINS students:

  1. Ashish Rauniyar, Paal E. Engelstad, Boning Feng, van Thanh Do (2016). Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm


E-mail:            Lothar.Fritsch@nr.no
Homepage:    http://www.nr.no/~lothar/

Students supervised:

  • Ebenezer Paintsil, 2010-2013: ‘Privacy and Security Risks Analysis in Identity Management Systems (employer: NR)’

Publications co-authored with COINS students:

  1. Lothar Fritsch, Ebenezer Paintsil (2010). 1st PhD retreat documentation – Minutes of the PETweb II PhD workshop, April 15-16, 2010
  2. Ebenezer Paintsil, Lothar Fritsch (2011). A Taxonomy of Privacy and Security Risks Contributing Factors
  3. Ebenezer Paintsil, Lothar Fritsch (2011). Taxonomy of Privacy and Security Risks Contributing Factors
  4. Ebenezer Paintsil, Lothar Fritsch (2011). Towards Legal Privacy Risk Assessment Automation in Social Media
  5. Ebenezer Paintsil, Lothar Fritsch (2013). Executable Model-Based Risk Analysis Method for Identity Management Systems: Using Hierarchical Colored Petri Nets
  6. Ebenezer Paintsil, Lothar Fritsch (2013). Executable Model-Based Risk Assessment Method for Identity Management Systems
  7. Ebenezer Paintsil, Lothar Fritsch, Einar Snekkenes (2013). Privacy and Security Risks Analysis of Identity Management Systems


Students supervised:

  • Siddhartha Kumar, 2015-2018: ‘Secure and Reliable Distributed Storage Systems (employer: Simula School of Research and Innovation)’


E-mail:            
Homepage:    

Students supervised:

  • Stig Andersen, 2016-2020: ‘Investigative quality in digital forensics (employer: Oslo Police District)’


E-mail:            christian.rathgeb@h-da.de
Homepage:    https://www.dasec.h-da.de/staff/christia…

Students supervised:

  • Pawel Drozdowski, 2016-2019: ‘Efficient privacy-preserving identification in large-scale multi-biometric systems (employer: Hochschule Darmstadt)’


Students supervised:

  • Manish Shrestha, 2016-2019: ‘Measurable security and privacy for services on the Smart Electricity Grid’


Students supervised:

  • Kassaye Yitbarek Yigzaw, 2013-2016: ‘Snow Stat: Secure Multi?party Statistical Computations in Health Environments’

Publications co-authored with COINS students:

  1. Johan Gustav Bellika, Kassaye Yitbarek Yigzaw, Torje Starbo Henriksen, Lars Ilebrekke, Stein Olav Skrøvseth, Per Atle Bakkevoll, Erlend Bønes, Eirik Leer, Monika Alise Johansen, Taridzo Chomutare, Gunnar Skov Simonsen, Marc Geilhufe, Gro Berntsen, Stein Are Gjelstad, Gunnar Hartvigsen, Fred Godtliebsen (2013). The Snow system – a distributed medical data processing system


E-mail:            thanh-van.do@ntnu.no
Homepage:    http://www.ntnu.edu/employees/thanh-van….

Students supervised:

  • Ashish Rauniyar, 2016-2020: ‘Towards a Secure, Energy Efficient and Resilient Internet of Things (employer: Høgskolen i Oslo og Akershus)’

Publications co-authored with COINS students:

  1. Ashish Rauniyar, Paal E. Engelstad, Boning Feng, van Thanh Do (2016). Crowdsourcing-based Disaster Management using Fog Computing in Internet of Things Paradigm


E-mail:            Evi.Zouganeli@hioa.no
Homepage:    https://www.hioa.no/tilsatt/evizou

Students supervised:

  • Flávia Dias Casagrande, 2016-2019: ‘Self-learning systems for Assisted Living Technologies (employer: Høgskolen i Oslo og Akershus)’