Research output of COINS students

Below you can see the research output generated by Ph.D. student members of COINS.

Mohamed Abomhara

  1. Mohamed Ali Saleh Abomhara, Geir Myrdahl Køien. Security and Privacy in the Internet of Things: Current Status and Open Issues

Bikash Agrawal

  1. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk. R2Time: a framework to analyse OpenTSDB timeseries data in HBase

Vivek Agrawal

  1. Vivek Agrawal. Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Waqas Aman

  1. Waqas Aman, Einar Snekkenes. Event Driven Adaptive Security in Internet of Things

Maria Bartnes

  1. Maria Bartnes Line, Inger Anne Tøndel, Gorm Idar Johansen, Hanne Sæle. Informasjonssikkerhet og personvern:Støtte til risikoanalyse av AMS og tilgrensende systemer
  2. Inger Anne Tøndel, Maria Bartnes Line, Gorm Idar Johansen, Martin Gilje Jaatun. Risikoanalyse av AMS knyttet til informasjonssikkerhet og personvern
  3. Maria Bartnes Line, Bjørn Jonny Villa. Offentlige WiFi-nett er en større sikkerhetsrisiko enn falske basestasjoner
  4. Maria Bartnes Line. Beredskapsøvelser for IT-sikkerhetshendelser i kraftsektoren
  5. Maria Bartnes Line, Ali Zand, Gianluca Stringhini, Richard A. Kemmerer. Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
  6. Maria Bartnes Line. Kraftselskapene trener ikke på dataangrep
  7. Maria Bartnes Line, Karin Modig. Hackerangrep – hvor forberedt er du?
  8. Maria Bartnes Line. Smarte strømmålere – smartere hackere: et miniforedrag
  9. Maria Bartnes Line, Atle Abelsen. Det haster å sikre IT-system
  10. Maria Bartnes Line, Ali Zand, Gianluca Stringhini, Richard A. Kemmerer. Vær IT-beredt
  11. Maria Bartnes Line. Målrettede angrep – er nettselskapene forberedt?
  12. Maria Bartnes Line, Leif Martin Kirknes. Ikke godt nok forberedt
  13. Maria Bartnes Line. Smarte strømnett former fremtiden
  14. Atle Abelsen, Maria Bartnes Line, Atle Årnes. Vokter personvernet
  15. Inger Anne Tøndel, Maria Bartnes Line, Martin Gilje Jaatun. Information security incident management: Current practice as reported in the literature
  16. Cathrine Hove, Marte Tårnes, Maria Bartnes Line, Karin Bernsmed. Information security incident management: Identified practice in large organizations
  17. Maria Bartnes Line, Inger Anne Tøndel, Martin Gilje Jaatun. Information security incident management: Planning for failure
  18. Maria Bartnes Line. Etterlyser nytenkning hos nettselskapene
  19. Maria Bartnes Line. Fem spørsmål om personvern
  20. Maria Bartnes Line. Eksersis mot strøm-hackere
  21. Erlend Andreas Gjære, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Åsmund Ahlmann Nyre, Karin Bernsmed, Maria Bartnes Line. Infosec – Blogg fra faggruppe for informasjonssikkerhet, SINTEF IKT
  22. Maria Bartnes Line. Why securing smart grids is not just a straightforward consultancy exercise

Antorweep Chakravorty

  1. Bikash Agrawal, Antorweep Chakravorty, Chunming Rong, Tomasz Wiktor Wlodarczyk. R2Time: a framework to analyse OpenTSDB timeseries data in HBase
  2. Antorweep Chakravorty. Spørsmål om Smarthus
  3. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk. A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  4. Antorweep Chakravorty, Chunming Rong, Pål Evensen, Tomasz Wiktor Wlodarczyk. A Distributed Gaussian-Means Clustering Algorithm for Forecasting Domestic Energy Usage
  5. Antorweep Chakravorty. Amerikanere hyller norsk student-idé
  6. Antorweep Chakravorty. Smart eller overvåket?
  7. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud
  8. Antorweep Chakravorty, Tomasz Wiktor Wlodarczyk, Chunming Rong. A Scalable K-Anonymization Solution for Preserving Privacy in an Aging-in-Place Welfare Intercloud

Seraj Fayyad

  1. Arne J. Berre, Erol Cagatay, Hai-Ying Liu, Josef Noll, Michael John Kobernus, Nuria Castell, Seraj Fayyad, Wesal Khattak. Citi-Sense-MOB. Conceptual services design document.
  2. Seraj Fayyad, Josef Noll. Toward Real Time IT Risk Assessment Methodology
  3. Seraj Fayyad, Josef Noll. Security and Safety Composition Methodology

Britta Hale

  1. Britta J. Hale, Colin Alexander Boyd. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
  2. Britta J. Hale, Colin Alexander Boyd. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol

Håkon Jacobsen

  1. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy. CAESAR candidate PiCipher
  2. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed Ezzat El Hadedy Aly. Pi-Cipher: Authenticated Encryption for Big Data

Oleksandr Kazymyrov

  1. Dmytro Kaidalov, Roman Oliynykov, Oleksandr Kazymyrov. A method for security estimation of the SPN-based block cipher against related-key attacks
  2. Oleksandr Kazymyrov. Methods and Tools for Analysis of Symmetric Cryptographic Primitives

Kjetil Kjernsmo

  1. Kjetil Kjernsmo. RDF::LinkedData
  2. Kjetil Kjernsmo. The prevalence of HTTP caching headers on SPARQL Endpoint
  3. Gregory Todd Williams, Kjetil Kjernsmo. Pushing complexity down the stack

Chunlei Li

  1. Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth. Some results on cross-correlation distribution between a p-Ary m-sequence and its decimated sequences
  2. Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth. A class of de Bruijn sequences
  3. Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan. Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
  4. Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang. Optimal ternary cyclic codes with minimum distance four and five
  5. Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding. The weight distributions of several classes of cyclic codes from APN monomials
  6. Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu. The properties of a class of linear FSRs and their applications to the construction of nonlinear FSRs
  7. Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li. Cross-correlation between a p-ary m-sequence and its all decimated sequences for d = (pm+1)(pm+p-1)/p+1
  8. Chunlei Li. Sequences and Linear Codes from Highly Nonlinear Functions

Guoqiang Li

  1. Guoqiang Li, Christoph Busch, Bian Yang. A novel approach used for measuring fingerprint orientation of arch fingerprint
  2. Bian Yang, Huiguang Chu, Guoqiang Li, Slobodan Petrovic, Christoph Busch. Cloud Password Manager Using Privacy-Preserved Biometrics
  3. Guoqiang Li, Bian Yang, Christoph Busch. A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code

Yan Li

  1. Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen. Approaches for the combined use of risk analysis and testing: A systematic literature review

Yi-Ching Liao

  1. Rune Nordvik, Yi-Ching Liao, Hanno Langweg. AccountabilityFS: A File System Monitor for Forensic Readiness
  2. Yi-Ching Liao, Hanno Langweg. Resource-Based Event Reconstruction of Digital Crime Scenes
  3. Yi-Ching Liao, Hanno Langweg. Process Tracking for Forensic Readiness
  4. Yi-Ching Liao, Hanno Langweg. Cost-benefit analysis of kernel tracing systems for forensic readiness

Soumik Mondal

  1. Kiran Bylappa Raja, Rachamandra Raghavendra, Christoph Busch, Soumik Mondal. An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum
  2. Soumik Mondal, Patrick Bours. Continuous Authentication using Fuzzy Logic

Martin Aastrup Olsen

  1. Marek Dusio, Martin Aastrup Olsen, Christoph Busch. Fingerprint sample quality assessment via ridge line count using Laplacian of Gaussian edge finding
  2. Ivan Danov, Martin Aastrup Olsen, Christoph Busch. Interpretation of fingerprint image quality features extracted by self-organizing maps
  3. Jinghua Wang, Martin Aastrup Olsen, Christoph Busch. Finger image quality based on singular point localization

Pankaj Pandey

  1. Pankaj Pandey, Einar Snekkenes. Using prediction markets to hedge information security risks
  2. Pankaj Pandey, Einar Snekkenes. Using Prediction Markets to Hedge Information Security Risks
  3. Pankaj Pandey, Einar Snekkenes. An Assessment of Market Methods for Information Security Risk Management
  4. Pankaj Pandey, Einar Snekkenes. Applicability of Prediction Markets in Information Security Risk Management

Simona Samardjiska

  1. Simona Samardjiska, Danilo Gligoroski. Linearity Measures for Multivariate Public Key Cryptography
  2. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy. CAESAR candidate PiCipher
  3. Danilo Gligoroski, Simona Samardjiska. iSHAKE: Incremental Hashing With SHAKE128 and SHAKE256 for the Zettabyte Era
  4. Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed Ezzat El Hadedy Aly. Pi-Cipher: Authenticated Encryption for Big Data

Kashif Habib Sheikh

  1. Kashif Habib. Ethical Aspects of the Internet of Things in eHealth
  2. Kashif Habib. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth
  3. Kashif Habib, Arild Braathen Torjusen, Wolfgang Leister. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth

Berglind Smaradottir

  1. Martin Gerdes, Berglind Smaradottir, Rune Werner Fensli. End-to-End Infrastructure for Usability Evaluation of eHealth Applications and Services
  2. Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen, Rune Werner Fensli, Santiago Martinez. Usability Evaluation of Electronic forms and Collaborative Asssessment Report in an Intermunicipality Health Care team for Dementia Diagnose
  3. Rune Werner Fensli, Martin Gerdes, Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen. Samhandling på tvers med fokus på sikker implementering, avklaring av databehandlingsansvar og varige driftsløsninger
  4. Berglind Smaradottir, Santiago Martinez. Fremtidens eldreomsorg i eget hjem, demonstrasjon av velferdsteknologi
  5. Berglind Smaradottir, Martin Gerdes. Demonstration of United4Health telemedicine application for home-monitoring of COPD-symptoms
  6. Berglind Smaradottir. Senter for eHelse presenterer forskningsprosjektet United4Health
  7. Martin Gerdes, Berglind Smaradottir, Rune Werner Fensli. End-to-end Infrastructure for Usability Evaluation of eHealth Applications and Services
  8. Berglind Smaradottir, Elisabeth Holen-Rabbersvik, Elin Thygesen, Rune Werner Fensli, Santiago Martinez. Usability Evaluation of Electronic forms and Collaborative Asssessment Report in an Inter-municipality Health Care team for Dementia Diagnose

Ctirad Sousedik

  1. Niclas Overgaard, Ctirad Sousedik, Christoph Busch. Eulerian Video Magnification for Fingerprint Liveness Detection
  2. Ctirad Sousedik, Christoph Busch. Quality of Fingerprint Scans captured using Optical Coherence Tomography
  3. John Ellingsgård, Ctirad Sousedik, Christoph Busch. Detecting fingerprint alterations by orientation field and minutiae orientation analysis
  4. Ctirad Sousedik, Christoph Busch. Presentation attack detection methods for fingerprint recognition systems: a survey

Aryan TaheriMonfared

  1. Aryan TaheriMonfared, Chunming Rong. Flexible Building Blocks for Software Defined Network Function Virtualization
  2. Aryan TaheriMonfared, Chunming Rong. Flexible Building Blocks for Software Defined Network Function Virtualization

Mohsen Toorani

  1. Mohsen Toorani. Security analysis of J-PAKE

Joseph Twayigira

  1. Joseph Twayigira, Vladimir Oleshchuk. User authentication in mobile cloud-based crisis and emergency management

Nils Ulltveit-Moe

  1. Nils Ulltveit-Moe. Science ethics: Young scientists speak [14]
  2. Terje Gjøsæter, Nils Ulltveit-Moe, Mohan Lal Kolhe, Rune Hylsberg Jacobsen, Emad Samuel Malki Ebeid. Security and Privacy in the SEMIAH Home Energy Management System
  3. Stefan Siegl, Nils Ulltveit-Moe. Secure by design:An approach for a virtual power plant
  4. Nils Ulltveit-Moe. My Experience doing a PhD
  5. Nils Ulltveit-Moe. A roadmap towards improving managed security services from a privacy perspective
  6. Nils Ulltveit-Moe. Reversible Anonymiser for XML Documents
  7. Nils Ulltveit-Moe. Cloud-based Mobile Health Apps
  8. Shelly Benjaminy, Rosalie Doerksen, Fengbo Li, Roddy Grieves, Girish Valluru, Karen J. Jacob, Cody Lo, Nina Di Pietro, Brett Favaro, Jiang Zhao, Kelly P. Downing, Ádán Kun, Yi Weng, Xin Miao, Nils Ulltveit-Moe. Science ethics: Young scientists speak
  9. Nils Ulltveit-Moe, Geir Lid, Stein Harald Øigård. Kunnskapens teaterscene
  10. Nils Ulltveit-Moe. Privacy-enhanced Network Monitoring
  11. Nils Ulltveit-Moe. Privacy enhancing Technologies for Cloud Computing
  12. Nils Ulltveit-Moe, Svein Walstad. Doktoranden fra Mo
  13. Nils Ulltveit-Moe. Privacy-enhanced Network Monitoring
  14. Nils Ulltveit-Moe, Liv Eva Welhaven Løchen, Håvard Raustøl. Han vil redde dine opplysninger
  15. Nils Ulltveit-Moe, Håvard Raustøl. Radiointervju med Nils Ulltveit-Moe på Sørlandssendinga om doktorgradsavhandlingen “Personvernforbedret dataovervåkning”
  16. Nils Ulltveit-Moe, Svein Walstad. Tar doktorgrad og forsker på datasikkerhet i Europa
  17. Nils Ulltveit-Moe. SnakeSpeed – Compete with Snakes on Eating the Frog
  18. Zhendong Ma, Paul Smith, Kieran McLaughlin, Nils Ulltveit-Moe, Jörg Kippe. PRECYSE Security Technologies for Critical Infrastructure Security
  19. Nils Ulltveit-Moe, Leonardo Grassi. PRECYSE Framework for ICS Security: Methodology, Architecture and Test suite
  20. Nils Ulltveit-Moe, Terje Gjøsæter. WP2 Methodology to identify assets and associated threats and vulnerabilities

Dijana Vukovic

  1. Dijana Vukovic, Zoran Djuric, Danilo Gligoroski. CryptoCloak application – main idea, an overview and improvement proposal
  2. Dijana Vukovic. CryptoCloak as a Protection Against Internet Surveillance
  3. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric. Improvement Proposal for the CryptoCloak Application
  4. Ognjen V Joldzic, Zoran Djuric, Dijana Vukovic. Experiences and Challenges in Implementing Adaptive Bitrate Multimedia Streaming for Live Multimedia Content
  5. Ognjen V Joldzic, Zoran Djuric, Dijana Vukovic. Experiences and Challenges in Implementing Adaptive Bitrate Multimedia Streaming for Live Multimedia Content
  6. Dijana Vukovic. Security Issues of Passive RFID Tags Used in Internet of Things (IoT)
  7. Dijana Vukovic. Security Issues in Internet of Things (IoT) Related to Passive RFID Tags
  8. Dijana Vukovic, Zoran Djuric, Danilo Gligoroski. CryptoCloak – Improvement Proposal Implementation
  9. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric. On Privacy Protection in the Internet Surveillance Era

Gaute Wangen

  1. Gaute Wangen, Einar Snekkenes. A Comparison between Business Process Management and Information Security Management

Goitom Weldehawaryat

  1. Goitom Weldehawaryat, Stephen Wolthusen. Asynchronous Binary Byzantine Consensus over Graphs with Power-Law Degree Sequence

Huihui Yang

  1. Huihui Yang, Vladimir Oleshchuk. An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
  2. Huihui Yang, Jiao Lei, Vladimir Oleshchuk. A General Framework for Group Authentication and Key Exchange Protocols

Kassaye Yitbarek Yigzaw

  1. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. A communicable disease prediction benchmarking platform
  2. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Evaluation of Secure Multi-Party Computation for Reuse of Distributed Electronic Health Data
  3. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. A communicable disease prediction benchmarking platform
  4. Johan Gustav Bellika, Torje Dahle Henriksen, Kassaye Yitbarek Yigzaw. The Snow System – a Decentralized Medical Data Processing System
  5. Kassaye Yitbarek Yigzaw, Johan Gustav Bellika. Evaluation of secure multi-party computation for reuse of distributed electronic health data
  6. Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen. Privacy preserving health data processing
  7. Anders Andersen, Kassaye Yitbarek Yigzaw, Randi Karlsen. Privacy preserving health data processing