Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

ENsuring Secure and Safe CMD Design with Zero TRUST Principles

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

FedMAC: Federated Multi-Algorithm Clustering for Autonomic Systems (opens in new window)

Author(s): Erik Johannes Husom, Rustem Dautov, Arda Goknil
Publisher: IEEE
DOI: 10.1109/ACSOS-C66519.2025.00025

SPARK: Secure Privacy-Preserving Anonymous Swarm Attestation for In-Vehicle Networks (opens in new window)

Author(s): Wouter Hellemans, Nada El Kassem, Md Masoom Rabbani, Edlira Dushku, Liqun Chen, An Braeken, Bart Preneel, Nele Mentens
Publisher: IEEE
DOI: 10.1109/EUROSP63326.2025.00056

A Way Forward for the MDCG 2019-16 Medical Device Security Guidance (opens in new window)

Author(s): Steve Taylor, Martin Gilje Jaatun, Karin Bernsmed, Christos Androutsos, Dietmar Frey, Simone Favrin, João Rodrigues, DušKo Milojević, Dimitrios Karras, Ioannis Siachos, Gregory Epiphaniou, Nabil Moukafih, Sotiris Messinis, Ioannis Rallis, et al.
Published in: PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, Issue Pages 593 - 599, 2024, ISBN 979-8-4007-1760-4
Publisher: ACM
DOI: 10.5281/ZENODO.13383761

BAHS: A Blockchain-Aided Hash-Based Signature Scheme (opens in new window)

Author(s): Yalan Wang, Liqun Chen, Long Meng & Yangguang Tian
Published in: 2023
Publisher: Springer Nature Singapore
DOI: 10.5281/ZENODO.13383914

Hash-based Direct Anonymous Attestation (opens in new window)

Author(s): Liqun Chen∗ Changyu Dong† Nada EL Kassem∗ Christopher J. P. Newton∗ Yalan Wang∗
Published in: 2023
Publisher: PQCrypto
DOI: 10.5281/ZENODO.13383969

A New Hash-Based Enhanced Privacy ID Signature Scheme (opens in new window)

Author(s): Liqun Chen 0002; Changyu Dong; Nada El Kassem; Christopher J. P. Newton; Yalan Wang
Published in: Lecture Notes in Computer Science - Post-Quantum Cryptography, 2024
Publisher: PQCrypto
DOI: 10.1007/978-3-031-62743-9_2

ZEKRA: Zero-Knowledge Control-Flow Attestation (opens in new window)

Author(s): Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Published in: ISBN 979-8-4007-0098-9
Publisher: ASIA CCS
DOI: 10.5281/ZENODO.13680169

A Practical Forward-Secure DualRing (opens in new window)

Author(s): Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
Published in: Lecture Notes in Computer Science, Cryptology and Network Security, 2023
Publisher: Springer Nature Singapore
DOI: 10.1007/978-981-99-7032-2_25

Towards Secure IoT Deployments: A DSL and Digital Twin-Based Emulation Platform for Security Verification (opens in new window)

Author(s): Leonard Tudorache
Publisher: IEEE
DOI: 10.1109/MODELS-C68889.2025.00017

Towards Community-Driven Generative AI (opens in new window)

Author(s): Rustem Dautov, Erik Johannes Husom, Sagar Sen, Hui Song
Published in: Position Papers of the 18th Conference on Computer Science and Intelligence Systems, 2023, ISSN 2300-5963
Publisher: ACSIS
DOI: 10.5281/zenodo.13384087

Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting (opens in new window)

Author(s): Kwan Yin Chan, Liqun Chen, Yangguang Tian, Tsz Hon Yuen
Published in: ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Issue Pages 1066 - 1081, 2024, ISBN 979-8-4007-0482-6
Publisher: ACM
DOI: 10.1145/3634737.3656291

Latency-Aware Node Selection in Federated Learning (opens in new window)

Author(s): Rustem Dautov, Erik Johannes Husom
Publisher: IFIP Networking
DOI: 10.5281/ZENODO.13691441

Identity management standards: A literature review

Author(s): Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Published in: 2023, ISSN 2757-8259
Publisher: C&I at DergiPark

PRIVÉ: Towards Privacy-Preserving Swarm Attestation (opens in new window)

Author(s): Nada El Kassem; Wouter Hellemans; Ioannis Siachos; Edlira Dushku; Stefanos Vasileiadis; Dimitrios S. Karas; Liqun Chen; Constantinos Patsakis and Thanassis Giannetsos
Published in: 22nd International Conference on Security and Cryptography SECRYPT, 2025, ISBN 978-989-758-760-3
Publisher: SciTePress
DOI: 10.5220/0013629000003979

Context-Aware Digital Twins to Support Software Management at the Edge (opens in new window)

Author(s): Rustem Dautov, Hui Song
Publisher: RCIS 2023
DOI: 10.5281/ZENODO.13383930

FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption (opens in new window)

Author(s): Long Meng and Liqun Chen and Yangguang Tian and Mark Manulis and Suhui Liu
Published in: Preprint, 2024
Publisher: Cryptology ePrint Archive, Paper 2024/986
DOI: 10.5281/zenodo.13383957

RETRACT: Expressive Designated Verifier Anonymous Credentials (opens in new window)

Author(s): Heini Bergsson Debes, Thanassis Giannetsos
Published in: 2023, ISBN 979-8-4007-0772-8
Publisher: ARES
DOI: 10.5281/ZENODO.13459230

Drowsiness Detection Using Federated Learning: Lessons Learnt from Dealing with Non-IID Data (opens in new window)

Author(s): Rustem Dautov and Erik Johannes Husom
Published in: PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024, ISBN 979-8-4007-1760-4
Publisher: ACM
DOI: 10.5281/zenodo.13383943

Owl: An Augmented Password-Authenticated Key Exchange Scheme

Author(s): Feng Hao, Samiran Bag, Liqun Chen, and Paul C. van Oorschot
Published in: International Conference on Frontier Computing, 2024

Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems (opens in new window)

Author(s): Sam Afzal-Houshmand, Dimitrios Papamartzivanos, Sajad Homayoun, Entso Veliou, Christian D. Jensen, Athanasios Voulodimos, Thanassis Giannetsos
Published in: ISBN 979-8-3503-4649-7
Publisher: DCOSS-IoT
DOI: 10.5281/ZENODO.13680065

Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets (opens in new window)

Author(s): Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen
Published in: 2023
Publisher: IEEE
DOI: 10.1109/TRUSTCOM60117.2023.00146

FEASE: Fast and Expressive Asymmetric Searchable Encryption

Author(s): Long Meng and Liqun Chen and Yangguang Tian and Mark Manulis and Suhui Liu
Published in: USENIX Security Symposium 2024, 2024
Publisher: Cryptology ePrint Archive

AutoConf : Automated Configuration of Unsupervised Learning Systems using Metamorphic Testing and Bayesian Optimization (opens in new window)

Author(s): Lwin Khin Shar∗, Arda Goknil†, Erik Johannes Husom‡, Sagar Sen°◊, Yan Naing Tun¢“ and Kisub Kim 
Publisher: IEEE
DOI: 10.1109/ASE56229.2023.00094

Adaptable Runtime Monitoring for Intermittent Systems (opens in new window)

Author(s): Eren Yildiz, Khakim Akhunov, Lorenzo Antonio Riva, Arda Goknil, Ivan Kurtev, Kasim Sinan Yildirim
Published in: Proceedings of the Nineteenth European Conference on Computer Systems, 2024
Publisher: ACM
DOI: 10.1145/3627703.3650070

Raft Protocol for Fault Tolerance and Self-Recovery in Federated Learning (opens in new window)

Author(s): Rustem Dautov, Erik Johannes Husom
Published in: SEAMS '24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2024, ISBN 979-8-4007-0585-4
Publisher: ACM
DOI: 10.5281/zenodo.13384065

A Practical Forward-Secure DualRing (opens in new window)

Author(s): Nan Li 0007; Yingjiu Li; Atsuko Miyaji; Yangguang Tian; Tsz Hon Yuen
Published in: Lecture Notes in Computer Science - Cryptology and Network Security, 2023
Publisher: CANS
DOI: 10.1007/978-981-99-7563-1_23

A PUF-based Root-of-Trust for resource-constrained IoT devices (opens in new window)

Author(s): Evgenia-Niovi Sassalou; Stefanos Vasileiadis; Stylianos A. Kazazis; Georgia Protogerou; Nikos Varvitsiotis; Dimitrios S. Karas
Published in: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025, ISBN 979-8-3315-3591-9
Publisher: IEEE
DOI: 10.1109/CSR64739.2025.11130114

Holistic IoT Security, Privacy and Safety: Integrated, Approaches Protecting A Highly Connected World (opens in new window)

Author(s): Konstantinos Loupos
Published in: 2025, ISBN 978-1-63828-507-6
Publisher: Now Publishers
DOI: 10.1561/9781638285076

Policy-Based Remote User Authentication From Multi-Biometrics (opens in new window)

Author(s): Yangguang Tian, Yingjiu Li, Robert H Deng, Guomin Yang, Nan Li
Published in: The Computer Journal, Issue Pages 1814–1825, 2023, ISSN 0010-4620
Publisher: Oxford Academic
DOI: 10.1093/COMJNL/BXAD102

Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting (opens in new window)

Author(s): Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou
Published in: IEEE Transactions on Information Forensics and Security, Issue 19, 2024, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/TIFS.2023.3340917

IEEE Transactions on Industrial Informatics (opens in new window)

Author(s): Suhui Liu; Liquan Chen; Liqun Chen; Jianchang Lai
Published in: IEEE Transactions on Industrial Informatics, 2024, ISSN 1551-3203
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.5281/ZENODO.13384052

Practical and secure policy-based chameleon hash for redactable blockchains (opens in new window)

Author(s): Nan Li, Yingjiu Li, Mark Manulis, Yangguang Tian, Guomin Yang
Published in: The Computer Journal, Issue 67, 2024, ISSN 0010-4620
Publisher: Oxford University Press (OUP)
DOI: 10.1093/COMJNL/BXAE075/7723759

International Journal of Information Security (opens in new window)

Author(s): Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras & Christos Xenakis
Published in: International Journal of Information Security, Issue Volume 23, pages 347–371, 2023, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-023-00741-8

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0