SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Selander Göran) "

Sökning: WFRF:(Selander Göran)

  • Resultat 1-10 av 35
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Selander, Sven-Åke, et al. (författare)
  • Kyrko- och samfundsvetenskap
  • 2001
  • Ingår i: Theologicum i Lund : undervisning och forskning i tusen år - undervisning och forskning i tusen år. - 9188552381 ; , s. 140-149
  • Bokkapitel (refereegranskat)
  •  
2.
  • Aasvang, Gunn Marit, et al. (författare)
  • Burden of disease due to transportation noise in the Nordic countries.
  • 2023
  • Ingår i: Environmental research. - 1096-0953. ; 231:Pt 1
  • Tidskriftsartikel (refereegranskat)abstract
    • Environmental noise is of increasing concern for public health. Quantification of associated health impacts is important for regulation and preventive strategies.To estimate the burden of disease (BoD) due to road traffic and railway noise in four Nordic countries and their capitals, in terms of DALYs (Disability-Adjusted Life Years), using comparable input data across countries.Road traffic and railway noise exposure was obtained from the noise mapping conducted according to the Environmental Noise Directive (END) as well as nationwide noise exposure assessments for Denmark and Norway. Noise annoyance, sleep disturbance and ischaemic heart disease were included as the main health outcomes, using exposure-response functions from the WHO, 2018 systematic reviews. Additional analyses included stroke and type 2 diabetes. Country-specific DALY rates from the Global Burden of Disease (GBD) study were used as health input data.Comparable exposure data were not available on a national level for the Nordic countries, only for capital cities. The DALY rates for the capitals ranged from 329 to 485 DALYs/100,000 for road traffic noise and 44 to 146 DALY/100,000 for railway noise. Moreover, the DALY estimates for road traffic noise increased with up to 17% upon inclusion of stroke and diabetes. DALY estimates based on nationwide noise data were 51 and 133% higher than the END-based estimates, for Norway and Denmark, respectively.Further harmonization of noise exposure data is required for between-country comparisons. Moreover, nationwide noise models indicate that DALY estimates based on END considerably underestimate national BoD due to transportation noise. The health-related burden of traffic noise was comparable to that of air pollution, an established risk factor for disease in the GBD framework. Inclusion of environmental noise as a risk factor in the GBD is strongly encouraged.
  •  
3.
  • Amato, Alberto, et al. (författare)
  • Grazer-induced transcriptomic and metabolomic response of the chain-forming diatom Skeletonema marinoi
  • 2018
  • Ingår i: ISME Journal. - : Springer Science and Business Media LLC. - 1751-7362 .- 1751-7370. ; 12, s. 1594-1604
  • Tidskriftsartikel (refereegranskat)abstract
    • Diatoms and copepods are main actors in marine food webs. The prey-predator interactions between them affect bloom dynamics, shape marine ecosystems and impact the energy transfer to higher trophic levels. Recently it has been demonstrated that the presence of grazers may affect the diatom prey beyond the direct effect of grazing. Here, we investigated the response of the chain-forming centric diatom Skeletonema marinoi to grazer cues, including changes in morphology, gene expression and metabolic profile. S. marinoi cells were incubated with Calanus finmarchicus or with Centropages typicus and in both cases responded by reducing the chain length, whereas changes in gene expression indicated an activation of stress response, changes in the lipid and nitrogen metabolism, in cell cycle regulation and in frustule formation. Transcripts linked to G protein-coupled receptors and to nitric oxide synthesis were differentially expressed suggesting involvement of these signalling transduction pathways in the response. Downregulation of a lipoxygenase in the transcriptomic data and of its products in the metabolomic data also indicate an involvement of oxylipins. Our data contribute to a better understanding of the gene function in diatoms, providing information on the nature of genes implicated in the interaction with grazers, a crucial process in marine ecosystems.
  •  
4.
  • Baudin, Clémence, et al. (författare)
  • Saliva cortisol in relation to aircraft noise exposure : pooled-analysis results from seven European countries
  • 2019
  • Ingår i: Environmental Health. - : Springer Science and Business Media LLC. - 1476-069X. ; 18
  • Tidskriftsartikel (refereegranskat)abstract
    • Background: Many studies have demonstrated adverse effects of exposure to aircraft noise on health. Possible biological pathways for these effects include hormonal disturbances. Few studies deal with aircraft noise effects on saliva cortisol in adults, and results are inconsistent.Objective: We aimed to assess the effects of aircraft noise exposure on saliva cortisol levels and its variation in people living near airports.Methods: This study focused on the 1300 residents included in the HYENA and DEBATS cross-sectional studies, with complete information on cortisol sampling. All the participants followed a similar procedure aiming to collect both a morning and an evening saliva cortisol samples. Socioeconomic and lifestyle information were obtained during a face-to-face interview. Outdoor aircraft noise exposure was estimated for each participant's home address. Associations between aircraft noise exposure and cortisol outcomes were investigated a priori for male and female separately, using linear regression models adjusted for relevant confounders. Different approaches were used to characterize cortisol levels, such as morning and evening cortisol concentrations and the absolute and relative variations between morning and evening levels.Results: Statistically significant increases of evening cortisol levels were shown in women with a 10-dB(A) increase in aircraft noise exposure in terms of LA(eq, 16h) (exp(beta) = 1.08; CI95% = 1.00-1.16), L-den (exp(beta) = 1.09; CI95% = 1.01-1.18), L-night (exp(beta) = 1.11; CI95% = 1.02-1.20). A statistically significant association was also found in women between a 10-dB(A) increase in terms of L-night and the absolute variation per hour (exp(beta) = 0.90; CI95% = 0.80-1.00). Statistically significant decreases in relative variation per hour were also evidenced in women, with stronger effects with the L-night (exp(beta) = 0.89; CI95% = 0.83-0.96) than with other noise indicators. The morning cortisol levels were unchanged whatever noise exposure indicator considered. There was no statistically significant association between aircraft noise exposure and cortisol outcomes in men.Conclusions: The results of the present study show statistically significant associations between aircraft noise exposure and evening cortisol levels and related flattening in the (absolute and relative) variations per hour in women. Further biological research is needed to deepen knowledge of the pathway between noise exposure and disturbed hormonal regulation, and specially the difference in effects between genders.
  •  
5.
  • Cherkaoui, Abdelkarim, et al. (författare)
  • New paradigms for access control in constrained environments
  • 2014
  • Ingår i: 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip, ReCoSoC 2014. - : IEEE Computer Society. - 9781479958108
  • Konferensbidrag (refereegranskat)abstract
    • The Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper addresses authentication and access control in the frame of the IoT. It presents Physical Unclonable Functions (PUF), which can provide cheap, secure, tamper-proof secret keys to authentify constrained M2M devices. To be successfully used in the IoT context, this technology needs to be embedded in a standardized identity and access management framework. On the other hand, Embedded Subscriber Identity Module (eSIM) can provide cellular connectivity with scalability, interoperability and standard compliant security protocols. The paper discusses an authorization scheme for a constrained resource server taking advantage of PUF and eSIM features. Concrete IoT uses cases are discussed (SCADA and building automation).
  •  
6.
  • Cherkaoui, Abdelkarim, et al. (författare)
  • New Paradigms for Authorization and Access Control in Constrained Environnements
  • 2014. - 8
  • Konferensbidrag (refereegranskat)abstract
    • The Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper adresses authentication, authorization and access control in the frame of the IoT. It describes two technologies which, used in conjunction, provide all the credentials for secure authorization and access control in wireless constrained hardware systems with scalability and interoperability requirements. Physical Unclonable Functions (PUF) are lightweight cryptographic primitives that can be easily embedded in reconfigurable hardware. They provide secure, low-cost authentication means for constrained devices. Embedded Subscriber Identity Module (eSIM) provide cellular connectivity with scalability, interoperability and standard compliant security protocols. An authorization scheme involving a client, an authorization server and a constrained resource server is proposed based on PUF and eSIM features. Concrete IoT uses cases are discussed (SCADA and building automation).
  •  
7.
  • Dubrova, Elena, et al. (författare)
  • CRC-Based Message Authentication for 5G Mobile Technology
  • 2015
  • Ingår i: Proceedings of 2015 IEEE Trustcom/BigDataSE/ISPA. - : Institute of Electrical and Electronics Engineers (IEEE). ; , s. 1186-1191
  • Konferensbidrag (refereegranskat)abstract
    • Our society greatly depends on mobile technologies. As wirelessly connected devices take over the control of the electricity in our homes, the water we drink and the transportation we use, it becomes increasingly important to guarantee the security of interactions of all players involved in a network. Apart from the high security needs, 5G will require utmost efficiency in the use of bandwidth and energy. In this paper, we show how to make the type of CRC checksum used in current LTE standards cryptographically secure with minimum extra resources. We present a new CRC-based message authentication method and provide a quantitative analysis of the achieved security as a function of message and CRC sizes. The presented method retains most of the implementation simplicity of the traditional CRC except that the LFSR implementing the encoding and decoding is required to have re-programmable connections. Similarly to previously proposed cryptographically secure CRCs, the presented CRC enables combining the detection of random and malicious errors without increasing bandwidth. Its main advantage is the ability to detect all double-bit errors in a message, which is of special importance for systems using Turbo codes, including LTE.
  •  
8.
  • Dubrova, Elena, et al. (författare)
  • Energy-Efficient Message Authentication for IEEE 802.15.4-Based Wireless Sensor Networks
  • 2014
  • Ingår i: <em>Proceedings of 32nd Nordic Microelectronics Conference NORCHIP </em>. - : IEEE conference proceedings.
  • Konferensbidrag (refereegranskat)abstract
    • The number of wirelessly connected devices is expected to increase to a few tens of billions by the year 2020. Newer generations of products and applications will sharpen demands for ultra-low energy consuming wireless devices. Various techniques for energy saving based on Discontinuous Reception (DRX) are known. However, DRX is vulnerable to unauthorized or fake trigger requests by malicious adversaries aiming to drain a device's battery. Existing message authentication methods can identify spoofed messages, but they require the reception of a complete message before its authenticity can be verified. In this paper, we present a method which inserts authentication checkpoints at several positions within a message. This enables a device to identify that a message is unauthorized and turn its radio receiver off as soon as the first checkpoint fails. The presented method has a low complexity with respect to the computational and memory resources and does not slow down the receiver. It can maintain the packet format prescribed by the IEEE 802.15.4 specification, which provides for backward compatibility. Finally, it incorporates authentication checkpoints at the MAC layer, which allows nodes that do not employ the presented method to participate in the communication.
  •  
9.
  • Dubrova, Elena, et al. (författare)
  • Message authentication based on cryptographically secure CRC without polynomial irreducibility test
  • 2018
  • Ingår i: Cryptography and Communications. - : Springer. - 1936-2447 .- 1936-2455. ; 10:2, s. 383-399
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we present a message authentication scheme based on cryptographically secure cyclic redundancy check (CRC). Similarly to previously proposed cryptographically secure CRCs, the presented one detects both random and malicious errors without increasing bandwidth. The main difference from previous approaches is that we use random instead of irreducible generator polynomials. This eliminates the need for irreducibility tests. We provide a detailed quantitative analysis of the achieved security as a function of message and CRC sizes. The results show that the presented scheme is particularly suitable for the authentication of short messages.
  •  
10.
  • Dubrova, Elena, et al. (författare)
  • Secure and Efficient LBIST for Feedback Shift Register-Based Cryptographic Systems
  • 2014
  • Ingår i: <em>Proceedings of 19th IEEE European Test Symposium (ETS'2014)</em>. - : IEEE conference proceedings.
  • Konferensbidrag (refereegranskat)abstract
    • Cryptographic methods are used to protect confidential information against unauthorised modification or disclo-sure. Cryptographic algorithms providing high assurance exist, e.g. AES. However, many open problems related to assuring security of a hardware implementation of a cryptographic algorithm remain. Security of a hardware implementation can be compromised by a random fault or a deliberate attack. The traditional testing methods are good at detecting random faults, but they do not provide adequate protection against malicious alterations of a circuit known as hardware Trojans. For example, a recent attack on Intel's Ivy Bridge processor demonstrated that the traditional Logic Built-In Self-Test (LBIST) may fail even the simple case of stuck-at fault type of Trojans. In this paper, we present a novel LBIST method for Feedback Shift Register (FSR)-based cryptographic systems which can detect such Trojans. The specific properties of FSR-based cryptographic systems allow us to reach 100% single stuck-at fault coverage with a small set of deterministic tests. The test execution time of the proposed method is at least two orders of magnitude shorter than the one of the pseudo-random pattern-based LBIST. Our results enable an efficient protection of FSR-based cryptographic systems from random and malicious stuck-at faults.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 35
Typ av publikation
tidskriftsartikel (16)
konferensbidrag (8)
doktorsavhandling (4)
annan publikation (3)
bokkapitel (3)
patent (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (26)
övrigt vetenskapligt/konstnärligt (9)
Författare/redaktör
Selander, Göran (16)
Selander, Jenny (8)
Pershagen, Göran (8)
Dubrova, Elena (5)
Seitz, Ludwig (5)
Aasvang, Gunn Marit (4)
visa fler...
Sørensen, Mette (4)
Roswall, Nina (4)
Lanki, Timo (4)
Pyko, Andrei (4)
Nylund, Göran M., 19 ... (4)
Selander, Erik, 1973 (4)
Näslund, Mats (4)
Stockfelt, Leo, 1981 (3)
Yli-Tuomi, Tarja (3)
Mattisson, Kristoffe ... (3)
Rizzuto, Debora (3)
Albin, Maria (3)
Leander, Karin (3)
Andersen, Zorana J. (3)
Oudin, Anna (3)
Brandt, Jørgen (3)
Lim, Youn-Hee (3)
Bluhm, Gösta (3)
Eneroth, Kristina (3)
Eriksson, Charlotta (3)
Ögren, Mikael (2)
Pavia, Henrik, 1964 (2)
Tjønneland, Anne (2)
Rosengren, Annika, 1 ... (2)
Ögren, Mikael, 1972 (2)
Spanne, Mårten (2)
Theorell, Töres (2)
Åkesson, Agneta (2)
Andersson, Eva M., 1 ... (2)
Barregård, Lars, 194 ... (2)
Segersson, David (2)
Heuschele, J. (2)
Selander, Staffan, P ... (2)
Raza, Shahid (2)
Bouget, Simon (2)
Selander, Sven-Åke (2)
Babisch, Wolfgang (2)
Ljungman, Petter (2)
Cherkaoui, Abdelkari ... (2)
Bossuet, Lilian (2)
Cole-Hunter, Thomas (2)
Christensen, Jesper ... (2)
Lindqvist, Fredrik (2)
Furuhed, Martin (2)
visa färre...
Lärosäte
Göteborgs universitet (8)
Stockholms universitet (8)
RISE (8)
Karolinska Institutet (8)
Kungliga Tekniska Högskolan (7)
Lunds universitet (7)
visa fler...
Umeå universitet (4)
Uppsala universitet (4)
Högskolan i Gävle (1)
Mittuniversitetet (1)
visa färre...
Språk
Engelska (30)
Svenska (5)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (11)
Teknik (8)
Medicin och hälsovetenskap (7)
Samhällsvetenskap (3)
Humaniora (3)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy