Pegah Nikbakht Bideh
Pegah Nikbakht Bideh
Ph.D student, Lund university
Verified email at
Cited by
Cited by
A survey of published attacks on Intel SGX
A Nilsson, PN Bideh, J Brorsson
arXiv preprint arXiv:2006.13598, 2020
Targeted watermark removal of a SVD-based image watermarking scheme
P Nikbakht, M Mahdavi
2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015
Security Analysis of two Key Based Watermarking Schemes Based on QR Decomposition
S Arasteh, M Mahdavi, PN Bideh, S Hosseini, AA Chapnevis
Electrical Engineering (ICEE), Iranian Conference on, 1499-1504, 2018
Targeted dewatermarking of two non-blind SVD-based image watermarking schemes
P Nikbakht, M Mahdavi
2015 5th International Conference on Computer and Knowledge Engineering …, 2015
HAVOSS: A maturity model for handling vulnerabilities in third party oss components
PN Bideh, M Höst, M Hell
International Conference on Product-Focused Software Process Improvement, 81-97, 2018
Energy consumption for securing lightweight IoT protocols
PN Bideh, J Sönnerup, M Hell
Proceedings of the 10th International Conference on the Internet of Things, 1-8, 2020
Software-defined networking for emergency traffic management in smart cities
P Nikbakht Bideh, N Paladi, M Hell
Vehicular Ad-hoc networks for smart cities, 59-70, 2020
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications
PN Bideh, M Mahdavi, SE Borujeni, S Arasteh
Multimedia Tools and Applications 77 (24), 31713-31735, 2018
On-demand Key Distribution for Cloud Networks
N Paladi, M Tiloca, PN Bideh, M Hell
2021 24th Conference on Innovation in Clouds, Internet and Networks and …, 2021
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
N Paladi, M Tiloca, PN Bideh, M Hell
EAI SecureComm 2021-17th EAI International Conference on Security and …, 2021
On the Suitability of Using SGX for Secure Key Storage in the Cloud
J Brorsson, PN Bideh, A Nilsson, M Hell
International Conference on Trust and Privacy in Digital Business, 32-47, 2020
Energy Consumption for Securing Lightweight IoT Protocols
P Nikbakht Bideh, J Sönnerup, M Hell
A Recommender System for User-Specific Vulnerability Scoring
L Karlsson, PN Bideh, M Hell
International Conference on Risks and Security of Internet and Systems, 355-364, 2019
Software based Hardware Security Modules based on SGX enclaves: Evaluating security and use cases.
PN Bideh, PDS LTH, LTH Alexander Nilsson, LTH Joakim Brorsson
A Recommender System for User-specific Vulnerability Scoring (full version)
L Karlsson, PN Bideh, M Hell
What makes a good course?
A Dalklint, A Henningsson, PN Bideh, J Ruuskanen, Q Song
Project and Conference Reports-CEE, LTH, 0
The system can't perform the operation now. Try again later.
Articles 1–16