Journals
- G.Nencioni, R.G.Garroppo, R.F.Olimid (2023): 5G Multi-access Edge Computing: a Survey on Security, Dependability, and Performance. IEEE Access. [paper]
- R.F.Olimid, G.Nencioni: 5G Network Slicing: A security overview, IEEE Access, vol.8, pp.99999-100009, 2020. [paper]
- A.Paskin-Cherniavsky, R.F.Olimid: On Cryptographic Anonymity and Unpredictability in Secret Sharing, Information Processing Letters, vol.161,105965, 2020. [paper]
- R.F.Olimid: SecRet: How to Apply the 5E Model for a Master Level Network Security Course, IEEE Communications Magazine Special Issue - Telecommunication and Network Engineering, 57(11):54-59, November, 2019. [paper]
- S.F.Mjølsnes, R.F.Olimid: Private Identification of Subscribers in Mobile Networks: Status and Challenges, IEEE Communications Magazine, vol.57(9), pp.138-144 (September, 2019). [paper]
- C.Sørseth, X.S.Zhou, S.F.Mjølsnes, R.F.Olimid: Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging, accepted for publication in Wireless Personal Communications, 109(1), pp.675-693, Springer. [paper] [Springer Nature Sharing] [arXiv]
- R.F.Olimid: SETUP in Secret Sharing Schemes using Random Values, Security and Communication Networks, vol.9(18), pp.6034-6041 (2016). [paper] [ePrint]
- R.F.Olimid, D.A.Rotaru: On the Security of a Backup Technique for Database Systems based on Threshold Sharing, Journal of Control Engineering and Applied Informatics (CEAI), Vol.18, No.2, pp.37--47 (2016). [paper]
- R.F.Olimid: Attacks against Group Key Transfer Protocols based on Secret Sharing, Scientific Bullentin of Univ. Politehnica of Timisoara, Vol. 59 (73), No. 2, pp.167--174 (2014). [paper] [online]
- R.F.Olimid: Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing, Appl. Math. Inf. Sci. 7(4), pp.1585--1590 (2013). [paper]
- R.F.Olimid: Python Implementation of Visual Secret Sharing Schemes, Journal of Information Systems & Operations Management (JISOM), vol.5, No.2.1., December 2011, pp.538-550 (2011). [paper]
Conferences & Workshops
- M.Gusatu, R.F.Olimid: Improved security solutions for DDoS mitigation in 5G Multi-access Edge Computing, accepted for publication at SecITC 2021 [arXiv]
- A.E.Panait, R.F.Olimid: On using zk-SNARKs and zk-STARKs in blockchain-based identity management, The 13th International Conference on Information Technology and Information Security, SecITC 2020. [event]
- A.E.Panait, R.F.Olimid, A.Stefanescu: Analysis of uPort Open, an identity management blockchain-based solution, The 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020, In International Conference on Trust and Privacy in Digital Business, pp. 3-13, Springer, Cham. Bratislava, Slovakia (14-17 September 2020). [paper] [preprint] [event]
- A.E.Panait, R.F.Olimid, A.Stefanescu: Identity Management on Blockchain - Privacy and Security Aspects, Romanian, Proceedings of the Romanian Academy, Series A, vol.21(1), Special Issue RCD’19, pp.45-52, Bucharest, Romania (16-18 September 2019). [paper] [event] [extended paper]
- M.L.Elle, S.F.Mjølsnes, R.F.Olimid: Distributed Personal Password Recovery Using Secret Sharing, NISK 2018 - 11th Norwegian Information Security Conference 2018, Longyearbyen, Svalbard, Norway (18-20 September 2018). [paper] [event]
- R.F.Olimid, S.F.Mjølsnes: On Low-Cost Privacy Exposure Attacks in LTE Mobile Communication, RCD-2017, Proceedings of the Romanian Academy, Series A, vol.18, Special Issue, pages 361-370, Bucharest, Romania (18-20 September 2017). [paper] [slides] [event]
- S.F.Mjølsnes, R.F.Olimid: Experimental Assessment of Private Information Disclosure in LTE Mobile Networks, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Vol. 6: SECRYPT, (ICETE 2017), pp.507-512, Madrid, Spain (July 2017). [paper] [poster] [event] [pic1] [pic2]
- S.F.Mjølsnes, R.F.Olimid: Easy 4G/LTE IMSI Catchers for Non-Programmers, Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, LNCS 10446, pp.235.246, Warsaw, Poland (August 2017). [paper] [arXiv] [event]
- S.F.Mjølsnes, R.F.Olimid, The Challenge of Private Identification, International Workshop on Open Problems in Network Security (iNetSec), May 2017, Rome, Italy. eCollection-1, pp.39-53, 2017, Open Problems in Network Security. [paper] [event]
- S.F.Mjølsnes, R.F.Olimid: Introducing Mobile Network Security Experiments to Communication Technology Education, Information Security Education for a Global Digital Society: 10th IFIP WG 11.8 World Conference, WISE 10, Proceedings, pp. 74-83, WISE10, Rome, Italy (May 2017). [paper] [event]
- H.Galteland, S.F.Mjølsnes, R.F.Olimid: Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking, Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 463-473, Kuala Lumpur, Malaysia (1-2 December 2016). [paper] [event]
- I.Giacomelli, R.F.Olimid, S.Ranellucci: Security of Linear Secret-Sharing Schemes against Mass Surveillance, CANS-2015, Marrakesh, Morocco (10-12 December 2015). [ePrint] The original publication is available at http://www.springerlink.com/
- R.F.Olimid: How to Split a Secret into Unknown Shares, RCD-2015, Bucharest, Romania (21-23 September 2015). [paper] [slides] [ePrint] [event]
- R.F.Olimid: On the (Non)Improvement of an Authenticated GKT Protocol, CISIS-2015, Burgos, Spain (15-17 June 2015). [slides] [event] The original publication is available at http://www.springerlink.com/
- R.F.Olimid: GOTCHA Challenge (Un) Solved , CISIS-2015, Burgos, Spain (15-17 June 2015). [slides] [event] The original publication is available at http://www.springerlink.com/
- R.F.Olimid, D.A.Rotaru: An Immediate Multi-party Generalization of ID-NIKE from Constrained PRF, Theory Day in Computer Science, Bucharest, Romania (15-16 September 2014). [paper] [event]
- R.F.Olimid: A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol, CISIS-2014, Bilbao, Spain (25-27 June 2014. [paper] [event] The original publication is available at http://www.springerlink.com/
- R.F.Olimid: On the Vulnerability of a Group Key Transfer Protocol based on Secret Sharing, SACI-2014, Timisoara, Romania (15-16 May 2014). [paper] [slides] [event]
- R.F.Olimid: On the (In)Security of Group Key Transfers based on Secret Sharing, RCD-2013, Bucharest, Romania (16-17 September 2013). [paper] [slides] [event]
- R.F.Olimid: Provable Secure Constant-Round Group Key Agreement Protocol based on Secret Sharing, CISIS-2013, Salamanca, Spain (11-13 September 2013);
- R.F.Olimid: A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol, WEWoRC 2013, Karlsruhe, Germany (24 - 26 July 2013) [paper] [event]
- R.F.Olimid: Insider attacks on two recent group key transfer protocols based on secret sharing, CrossFyre 2013, KU Leuven, Belgium (20 - 21 June 2013). [slides] [event]
- R.F.Olimid: On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing, Proceedings of ICT-EurAsia 2013 (AsiaARES 2013), pp. 399-408. [paper] [slides] [event] The original publication is available at http://www.springerlink.com/ Remarks on a citing paper: [remarks]
- R.F.Olimid: A New Public Key Cryptosystem with Key Escrow Capabilities, Proceedings of the 7th Annual South-East European Doctoral Student Conference (DSC 2012), pp.610-624. [paper] [slides] [event]
- A.Atanasiu, R.F. Olimid, E.Simion: Setup Attack in Visual Secret Sharing Schemes, Proceedings of the 4th International Conference on Security for Information Technology and Communications (SECITC 2011), pp.7-15. [web page]
- R.F.Olimid: About a Visual Secret Sharing Scheme, Proceedings of the 3rd International Conference on Security for Information Technology and Communications (SECITC 2010), pp.13-17. [paper] [slides] [event]