Follow
Pegah Nikbakht Bideh
Pegah Nikbakht Bideh
Ph.D student, Lund university
Verified email at eit.lth.se
Title
Cited by
Cited by
Year
A survey of published attacks on Intel SGX
A Nilsson, PN Bideh, J Brorsson
arXiv preprint arXiv:2006.13598, 2020
1292020
Energy consumption for securing lightweight IoT protocols
PN Bideh, J Sönnerup, M Hell
Proceedings of the 10th International Conference on the Internet of Things, 1-8, 2020
162020
Security analysis of two key based watermarking schemes based on QR decomposition
S Arasteh, M Mahdavi, PN Bideh, S Hosseini, AA Chapnevis
Electrical Engineering (ICEE), Iranian Conference on, 1499-1504, 2018
132018
Targeted watermark removal of a SVD-based image watermarking scheme
P Nikbakht, M Mahdavi
2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015
122015
HAVOSS: A maturity model for handling vulnerabilities in third party oss components
P Nikbakht Bideh, M Höst, M Hell
Product-Focused Software Process Improvement: 19th International Conference …, 2018
92018
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications
PN Bideh, M Mahdavi, SE Borujeni, S Arasteh
Multimedia Tools and Applications 77, 31713-31735, 2018
72018
Software-defined networking for emergency traffic management in smart cities
P Nikbakht Bideh, N Paladi, M Hell
Vehicular Ad-hoc Networks for Smart Cities: Third International Workshop …, 2020
62020
Targeted dewatermarking of two non-blind SVD-based image watermarking schemes
P Nikbakht, M Mahdavi
2015 5th International Conference on Computer and Knowledge Engineering …, 2015
62015
A Survey of Published Attacks on Intel SGX.(2020)
A Nilsson, PN Bideh, J Brorsson
arXiv preprint arXiv:2006.13598, 1-11, 2020
52020
A survey of published attacks on intel SGX. CoRR abs/2006.13598 (2020)
A Nilsson, PN Bideh, J Brorsson
52006
On-demand key distribution for cloud networks
N Paladi, M Tiloca, PN Bideh, M Hell
2021 24th Conference on Innovation in Clouds, Internet and Networks and …, 2021
42021
On the suitability of using SGX for secure key storage in the cloud
J Brorsson, PN Bideh, A Nilsson, M Hell
Trust, Privacy and Security in Digital Business: 17th International …, 2020
22020
A recommender system for user-specific vulnerability scoring
L Karlsson, PN Bideh, M Hell
Risks and Security of Internet and Systems: 14th International Conference …, 2020
22020
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks
P Nikbakht Bideh
International Conference on Information Security Practice and Experience …, 2022
12022
Contributions to Securing Software Updates in IoT
PN Bideh
12022
Rosym: Robust symmetric key based iot software upgrade over-the-air
P Nikbakht Bideh, C Gehrmann
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 35-46, 2022
12022
Chuchotage: In-line Software Network Protocol Translation for (D) TLS
P Nikbakht Bideh, N Paladi
International Conference on Information and Communications Security, 589-607, 2022
12022
Method for prioritizing among vulnerabilities in a software code and a server
L Karlsson, PN Bideh, M Hell
US Patent App. 17/594,225, 2022
2022
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
N Paladi, M Tiloca, P Nikbakht Bideh, M Hell
Security and Privacy in Communication Networks: 17th EAI International …, 2021
2021
Energy Consumption for Securing Lightweight IoT Protocols
P Nikbakht Bideh, J Sönnerup, M Hell
Association for Computing Machinery (ACM), 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20