• Postal addressShow on map

    Richard Petersens Plads, Building 324

    DK-2800 Kgs. Lyngby

    Denmark

Filter
Book chapter

Search results

  • 2023

    SDitH in the QROM

    Aguilar-Melchor, C., Hülsing, A., Joseph, D., Majenz, C., Ronen, E. & Yue, D., 2023, Advances in Cryptology – ASIACRYPT 2023. Springer, p. 317-350 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 14444).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2022

    Cloud Storage Client Forensic: Analysis of MEGA Cloud

    Mishra, H., Sihag, V., Choudhary, G., Dragoni, N. & You, I., 2022, Futuristic Trends in Networks and Computing Technologies. Springer, p. 1099-1110 (Lecture Notes in Electrical Engineering, Vol. 936).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • DIMDA: Deep Learning and Image-Based Malware Detection for Android

    Sihag, V., Prakash, S., Choudhary, G., Dragoni, N. & You, I., 2022, Futuristic Trends in Networks and Computing Technologies. Springer, p. 895-906 (Lecture Notes in Electrical Engineering, Vol. 936).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • Lightweight and Practical Privacy-Preserving Image Masking in Smart Community

    Liu, Z., Liu, Y. & Meng, W., 2022, Information and Communications Security. Springer, p. 221-239 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13407).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • Sandbox Environment for Real Time Malware Analysis of IoT Devices

    Kachare, G. P., Choudhary, G., Shandilya, S. K. & Sihag, V., 2022, Computing Science, Communication and Security. Springer, p. 169–183 (Communications in Computer and Information Science, Vol. 1604).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2021

    ActAnyware - Blockchain-Based Software Licensing Scheme

    Chiu, W. Y., Zhou, L., Meng, W., Liu, Z. & Ge, C., 2021, International Conference on Blockchain and Trustworthy Systems. Springer, p. 559-573 (Communications in Computer and Information Science, Vol. 1490).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • Efficient Attribute-Based Signature for Monotone Predicates

    Zhang, J., Chen, J. & Meng, W., 2021, International Conference on Provable Security. Springer, p. 346-362 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13059).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication

    Chiu, W-Y., Meng, W. & Li, W., 2021, Security, Privacy, and Anonymity in Computation, Communication, and Storage. Springer, Vol. 12382. p. 251-265 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 12382).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • Information Security and Privacy – Challenges and Outlook

    Furnell, S., Haskell-Dowland, P., Agrawal, M., Baskerville, R., Basu, A., Bishop, M., Cuellar, J., Foresti, S., Futcher, L., Gal-Oz, N., Herath, T., Damsgaard Jensen, C., Johnston, A., Joosen, W., Livraga, G., Lopez, J., Marsh, S., Martinelli, F., Massacci, F., Pasic, A., & 6 othersSchinagl, S., Shahim, A., Thomson, K. L., Vaidya, J., Vance, T. & Warkentin, M., 2021, Advancing Research in Information and Communication Technology. Springer, p. 383-401 (IFIP Advances in Information and Communication Technology, Vol. 600).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • Tight Adaptive Reprogramming in the QROM

    Grilo, A. B., Hövelmanns, K., Hülsing, A. & Majenz, C., 2021, International Conference on the Theory and Application of Cryptology and Information Security. Springer, p. 637-667 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13090).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

    File
    45 Downloads (Pure)
  • 2020

    ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks

    Ma, Z., Liu, L. & Meng, W., 2020, Information Security. Springer, p. 255-273 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 12472).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2017

    Architecturally Significant Requirements Identification, Classification and Change Management for Multi-tenant Cloud-Based Systems

    Chauhan, M. A. & Probst, C. W., 2017, Requirements Engineering for Service and Cloud Computing. Springer, p. 181-205 (Requirements Engineering for Service and Cloud Computing).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling

    Meng, W., Li, W., Wang, Y. & Au, M., 2017, Cyberspace Safety and Security. Springer, p. 163-175 (Cyberspace Safety and Security, Vol. 10581).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2016

    Smartphone User Authentication Using Touch Dynamics in the Big Data Era: Challenges and Opportunities

    Jiang, L. & Meng, W., 2016, Biometric Security and Privacy, Signal Processing for Security Technologies. Springer, p. 163-178 (Biometric Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2015

    Practical Attacks on AES-like Cryptographic Hash Functions

    Kölbl, S. & Rechberger, C., 2015, Progress in Cryptology - LATINCRYPT 2014. Springer, Vol. 8895. p. 259-273 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review