Pegah Nikbakht Bideh

Orcid: 0000-0001-7756-3723

According to our database1, Pegah Nikbakht Bideh authored at least 13 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Contributions to Securing Software Updates in IoT.
PhD thesis, 2022

LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks.
Proceedings of the Information Security Practice and Experience, 2022

Chuchotage: In-line Software Network Protocol Translation for (D)TLS.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air.
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 2022

2021
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

On-demand Key Distribution for Cloud Networks.
Proceedings of the 24th Conference on Innovation in Clouds, 2021

2020
A Survey of Published Attacks on Intel SGX.
CoRR, 2020

On the Suitability of Using SGX for Secure Key Storage in the Cloud.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Energy consumption for securing lightweight IoT protocols.
Proceedings of the IoT '20: 10th International Conference on the Internet of Things, 2020

2019
A Recommender System for User-Specific Vulnerability Scoring.
Proceedings of the Risks and Security of Internet and Systems, 2019

2018
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications.
Multim. Tools Appl., 2018

HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components.
Proceedings of the Product-Focused Software Process Improvement, 2018

2016
Feature extraction for detection of watermarking algorithm.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016


  Loading...