Scientific Articles

Privacy preserving data sharing and analysis for edge-based architectures

Authors: Mina Sheikhalishahi, Andrea Saracino, Fabio Martinelli, Antonio La Marra

Journal: International Journal of Information Security

Available: https://doi.org/10.1007/s10207-021-00542-x

Evaluating the Performance of the OSCORE Security Protocol in Constrained IoT Environments.

Authors: Martin Gunnarsson, Joakim Brorsson, Francesca Palombini, Ludwig Seitz and Marco Tiloca

Journal: Internet of Things; Engineering Cyber Physical Human Systems

Available: https://doi.org/10.1016/j.iot.2020.100333

Exploiting If This Then That and Usage Control obligations for Smart Home security and management

Authors: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, AthanasiosRizos, Andrea Saracino

Journal: Concurrency and Computation Practice and Experience

Available: Exploiting If This Then That and Usage Control obligations for Smart Home security and management

On-demand Key Distribution for Cloud Networks

Authors: Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh and Martin Hell

Conference: Proceedings of the 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track

Available: https://portal.research.lu.se/portal/files/98552766/paladi_key_distribution.pdf

Using recurrent neural networks for continuous authentication through gait analysis

Authors: Giacomo Giorgi, Andrea Saracino, Fabio Martinelli

Journal: Elsevier PR Letters

Available: https://www.sciencedirect.com/science/article/pii/S0167865521000970?via%3Dihub

Flowrider – Fast On-Demand Key Provisioning for Cloud Networks

Authors: Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh and Martin Hell

Conference: 17th EAI International Conference on Security and Privacy in Communication Networks (EAI SecureComm 2021)

Available: https://portal.research.lu.se/portal/files/98553541/SecureComm_2021.pdf