HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
Nikbakht Bideh, Pegah, Höst, Martin, Hell, Martin
Published in International Conference on on Product-Focused Software Process Improvement (PROFES 2018),Wolfsburg, Germany,2018-11-28 - 2018-11-30 (2018)
Published in International Conference on on Product-Focused Software Process Improvement (PROFES 2018),Wolfsburg, Germany,2018-11-28 - 2018-11-30 (2018)
Get full text
Book Chapter
Conference Proceeding
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
Get full text
Book Chapter
Conference Proceeding
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
Paladi, Nicolae, Tiloca, Marco, Nikbakht Bideh, Pegah, Hell, Martin
Published in International Conference on Security and Privacy in Communication SystemsSecureComm 2021: Security and Privacy in Communication Networks pp 207-228 (2021)
Published in International Conference on Security and Privacy in Communication SystemsSecureComm 2021: Security and Privacy in Communication Networks pp 207-228 (2021)
Get full text
Book Chapter
Conference Proceeding
On the Suitability of Using SGX for Secure Key Storage in the Cloud
Brorsson, Joakim, Bideh, Pegah Nikbakht, Nilsson, Alexander, Hell, Martin
Published in 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus2020,Bratislava, Slovakia,2020-09-14 - 2020-09-17 (2020)
Published in 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus2020,Bratislava, Slovakia,2020-09-14 - 2020-09-17 (2020)
Get full text
Book Chapter
Conference Proceeding
On-demand Key Distribution for Cloud Networks
Paladi, Nicolae, Tiloca, Marco, Bideh, Pegah Nikbakht, Hell, Martin
Published in 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) (01.03.2021)
Published in 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) (01.03.2021)
Get full text
Conference Proceeding
Security Analysis of two Key Based Watermarking Schemes Based on QR Decomposition
Arasteh, Sima, Mahdavi, Mojtaba, Bideh, Pegah Nikbakht, Hosseini, Samira, Chapnevis, AmirAhmad
Published in Electrical Engineering (ICEE), Iranian Conference on (01.05.2018)
Published in Electrical Engineering (ICEE), Iranian Conference on (01.05.2018)
Get full text
Conference Proceeding