BibTeX records: Einar Snekkenes

download as .bib file

@inproceedings{DBLP:conf/chira/SzekeresS21,
  author       = {Adam Szekeres and
                  Einar Snekkenes},
  editor       = {Hugo Pl{\'{a}}cido da Silva and
                  Larry L. Constantine and
                  Andreas Holzinger},
  title        = {Inferring Delay Discounting Factors from Public Observables: Applications
                  in Risk Analysis and the Design of Adaptive Incentives},
  booktitle    = {Proceedings of the 5th International Conference on Computer-Human
                  Interaction Research and Applications, {CHIRA} 2021, Online Streaming,
                  October 28-29, 2021},
  pages        = {70--80},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010663400003060},
  doi          = {10.5220/0010663400003060},
  timestamp    = {Fri, 19 Nov 2021 13:46:58 +0100},
  biburl       = {https://dblp.org/rec/conf/chira/SzekeresS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/SzekeresS21,
  author       = {Adam Szekeres and
                  Einar Snekkenes},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Sanjay Misra and
                  Chiara Garau and
                  Ivan Blecic and
                  David Taniar and
                  Bernady O. Apduhan and
                  Ana Maria A. C. Rocha and
                  Eufemia Tarantino and
                  Carmelo Maria Torre},
  title        = {Human Behavior Prediction for Risk Analysis},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2021 - 21st International
                  Conference, Cagliari, Italy, September 13-16, 2021, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12951},
  pages        = {288--303},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86970-0\_21},
  doi          = {10.1007/978-3-030-86970-0\_21},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/SzekeresS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SzekeresS20,
  author       = {Adam Szekeres and
                  Einar Arthur Snekkenes},
  title        = {Construction of Human Motivational Profiles by Observation for Risk
                  Analysis},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {45096--45107},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2976633},
  doi          = {10.1109/ACCESS.2020.2976633},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SzekeresS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/SzekeresS20,
  author       = {Adam Szekeres and
                  Einar Snekkenes},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Representing Decision-Makers in {SGAM-H:} The Smart Grid Architecture
                  Model Extended with the Human Layer},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {87--110},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_5},
  doi          = {10.1007/978-3-030-62230-5\_5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gramsec/SzekeresS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intellisys/YengNWYS20,
  author       = {Prosper Kandabongee Yeng and
                  Livinus Obiora Nweke and
                  Ashenafi Zebene Woldaregay and
                  Bian Yang and
                  Einar Arthur Snekkenes},
  editor       = {Kohei Arai and
                  Supriya Kapoor and
                  Rahul Bhatia},
  title        = {Data-Driven and Artificial Intelligence {(AI)} Approach for Modelling
                  and Analyzing Healthcare Security Practice: {A} Systematic Review},
  booktitle    = {Intelligent Systems and Applications - Proceedings of the 2020 Intelligent
                  Systems Conference, IntelliSys 2020, London, UK, September 3-4, 2020,
                  Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1250},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55180-3\_1},
  doi          = {10.1007/978-3-030-55180-3\_1},
  timestamp    = {Tue, 08 Dec 2020 11:58:53 +0100},
  biburl       = {https://dblp.org/rec/conf/intellisys/YengNWYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/YengYS19,
  author       = {Prosper Kandabongee Yeng and
                  Bian Yang and
                  Einar Arthur Snekkenes},
  editor       = {Chaitanya K. Baru and
                  Jun Huan and
                  Latifur Khan and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yuanyuan Tian and
                  Roger S. Barga and
                  Carlo Zaniolo and
                  Kisung Lee and
                  Yanfang (Fanny) Ye},
  title        = {Framework for Healthcare Security Practice Analysis, Modeling and
                  Incentivization},
  booktitle    = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData),
                  Los Angeles, CA, USA, December 9-12, 2019},
  pages        = {3242--3251},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BigData47090.2019.9006529},
  doi          = {10.1109/BIGDATA47090.2019.9006529},
  timestamp    = {Tue, 18 Oct 2022 14:44:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/YengYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YengYS19,
  author       = {Prosper Kandabongee Yeng and
                  Bian Yang and
                  Einar Snekkenes},
  editor       = {Vladimir Getov and
                  Jean{-}Luc Gaudiot and
                  Nariyoshi Yamai and
                  Stelvio Cimato and
                  J. Morris Chang and
                  Yuuichi Teranishi and
                  Ji{-}Jiang Yang and
                  Hong Va Leong and
                  Hossain Shahriar and
                  Michiharu Takemoto and
                  Dave Towey and
                  Hiroki Takakura and
                  Atilla El{\c{c}}i and
                  Susumu Takeuchi and
                  Satish Puri},
  title        = {Observational Measures for Effective Profiling of Healthcare Staffs'
                  Security Practices},
  booktitle    = {43rd {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2},
  pages        = {397--404},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMPSAC.2019.10239},
  doi          = {10.1109/COMPSAC.2019.10239},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/YengYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fruct/SzekeresS19,
  author       = {Adam Szekeres and
                  Einar Arthur Snekkenes},
  title        = {A Taxonomy of Situations within the Context of Risk Analysis},
  booktitle    = {25th Conference of Open Innovations Association, {FRUCT} 2019, Helsinki,
                  Finland, November 5-8, 2019},
  pages        = {306--316},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/FRUCT48121.2019.8981536},
  doi          = {10.23919/FRUCT48121.2019.8981536},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fruct/SzekeresS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/SzekeresWS19,
  author       = {Adam Szekeres and
                  Pankaj Shivdayal Wasnik and
                  Einar Arthur Snekkenes},
  editor       = {Joaquim Filipe and
                  Michal Smialek and
                  Alexander Brodsky and
                  Slimane Hammoudi},
  title        = {Using Demographic Features for the Prediction of Basic Human Values
                  Underlying Stakeholder Motivation},
  booktitle    = {Proceedings of the 21st International Conference on Enterprise Information
                  Systems, {ICEIS} 2019, Heraklion, Crete, Greece, May 3-5, 2019, Volume
                  2},
  pages        = {377--389},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007694203770389},
  doi          = {10.5220/0007694203770389},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/iceis/SzekeresWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/phealth/YengYS19,
  author       = {Prosper Kandabongee Yeng and
                  Bian Yang and
                  Einar Arthur Snekkenes},
  editor       = {Bernd Blobel and
                  Mauro Giacomini},
  title        = {Healthcare Staffs' Information Security Practices Towards Mitigating
                  Data Breaches: {A} Literature Survey},
  booktitle    = {pHealth 2019 - Proceedings of the 16th International Conference on
                  Wearable Micro and Nano Technologies for Personalized Health - 10-12
                  June 2019, Genoa, Italy},
  series       = {Studies in Health Technology and Informatics},
  volume       = {261},
  pages        = {239--245},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/978-1-61499-975-1-239},
  doi          = {10.3233/978-1-61499-975-1-239},
  timestamp    = {Tue, 11 Jun 2019 09:53:56 +0200},
  biburl       = {https://dblp.org/rec/conf/phealth/YengYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangenHS18,
  author       = {Gaute Wangen and
                  Christoffer Hallstensen and
                  Einar Snekkenes},
  title        = {A framework for estimating information security risk assessment method
                  completeness - Core Unified Risk Framework, {CURF}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {681--699},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0382-0},
  doi          = {10.1007/S10207-017-0382-0},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangenHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/AgrawalS18,
  author       = {Vivek Agrawal and
                  Einar Arthur Snekkenes},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Secure Benchmarking using Electronic Voting},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {191--206},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006827801910206},
  doi          = {10.5220/0006827801910206},
  timestamp    = {Wed, 29 Aug 2018 15:17:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/AgrawalS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/SzekeresS18,
  author       = {Adam Szekeres and
                  Einar Arthur Snekkenes},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Unobtrusive Psychological Profiling for Risk Analysis},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {376--386},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006858803760386},
  doi          = {10.5220/0006858803760386},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/SzekeresS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/criwg/AgrawalS17,
  author       = {Vivek Agrawal and
                  Einar Arthur Snekkenes},
  editor       = {Carl Gutwin and
                  Sergio F. Ochoa and
                  Julita Vassileva and
                  Tomoo Inoue},
  title        = {Factors Affecting the Willingness to Share Knowledge in the Communities
                  of Practice},
  booktitle    = {Collaboration and Technology - 23rd International Conference, {CRIWG}
                  2017, Saskatoon, SK, Canada, August 9-11, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10391},
  pages        = {32--39},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63874-4\_3},
  doi          = {10.1007/978-3-319-63874-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/criwg/AgrawalS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3k/AgrawalWS17,
  author       = {Vivek Agrawal and
                  Pankaj Wasnik and
                  Einar Arthur Snekkenes},
  editor       = {Kecheng Liu and
                  Ana Carolina Salgado and
                  Jorge Bernardino and
                  Joaquim Filipe},
  title        = {Factors Influencing the Participation of Information Security Professionals
                  in Electronic Communities of Practice},
  booktitle    = {Proceedings of the 9th International Joint Conference on Knowledge
                  Discovery, Knowledge Engineering and Knowledge Management - (Volume
                  3), Funchal, Madeira, Portugal, November 1-3, 2017},
  pages        = {50--60},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006498500500060},
  doi          = {10.5220/0006498500500060},
  timestamp    = {Tue, 23 Jan 2018 15:23:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3k/AgrawalWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icetc/AgrawalS17,
  author       = {Vivek Agrawal and
                  Einar Arthur Snekkenes},
  title        = {UnRizkNow: An open electronic community of practice for information
                  security professionals},
  booktitle    = {Proceedings of the 9th International Conference on Education Technology
                  and Computers, {ICETC} 2017, Barcelona, Spain, December 20-22, 2017},
  pages        = {191--197},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3175536.3175562},
  doi          = {10.1145/3175536.3175562},
  timestamp    = {Tue, 06 Nov 2018 16:58:26 +0100},
  biburl       = {https://dblp.org/rec/conf/icetc/AgrawalS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017-1,
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10492},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66402-6},
  doi          = {10.1007/978-3-319-66402-6},
  isbn         = {978-3-319-66401-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017-2,
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9},
  doi          = {10.1007/978-3-319-66399-9},
  isbn         = {978-3-319-66398-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/PandeyS16,
  author       = {Pankaj Pandey and
                  Einar Snekkenes},
  title        = {Using Financial Instruments to Transfer the Information Security Risks},
  journal      = {Future Internet},
  volume       = {8},
  number       = {2},
  pages        = {20},
  year         = {2016},
  url          = {https://doi.org/10.3390/fi8020020},
  doi          = {10.3390/FI8020020},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/PandeyS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/AmanS15,
  author       = {Waqas Aman and
                  Einar Snekkenes},
  title        = {{EDAS:} An Evaluation Prototype for Autonomic Event-Driven Adaptive
                  Security in the Internet of Things},
  journal      = {Future Internet},
  volume       = {7},
  number       = {3},
  pages        = {225--256},
  year         = {2015},
  url          = {https://doi.org/10.3390/fi7030225},
  doi          = {10.3390/FI7030225},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/AmanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmanS15,
  author       = {Waqas Aman and
                  Einar Snekkenes},
  title        = {Managing security trade-offs in the Internet of Things using adaptive
                  security},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {362--368},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412122},
  doi          = {10.1109/ICITST.2015.7412122},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PandeyS15,
  author       = {Pankaj Pandey and
                  Einar Arthur Snekkenes},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Design and Performance Aspects of Information Security Prediction
                  Markets for Risk Management},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {273--284},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005547502730284},
  doi          = {10.5220/0005547502730284},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PandeyS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/PandeyS14,
  author       = {Pankaj Pandey and
                  Einar Arthur Snekkenes},
  title        = {Applicability of Prediction Markets in Information Security Risk Management},
  booktitle    = {25th International Workshop on Database and Expert Systems Applications,
                  {DEXA} 2014, Munich, Germany, September 1-5, 2014},
  pages        = {296--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DEXA.2014.66},
  doi          = {10.1109/DEXA.2014.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/PandeyS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/WangenS14,
  author       = {Gaute Wangen and
                  Einar Arthur Snekkenes},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {A Comparison between Business Process Management and Information Security
                  Management},
  booktitle    = {Proceedings of the 2014 Federated Conference on Computer Science and
                  Information Systems, Warsaw, Poland, September 7-10, 2014},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {2},
  pages        = {901--910},
  year         = {2014},
  url          = {https://doi.org/10.15439/2014F77},
  doi          = {10.15439/2014F77},
  timestamp    = {Tue, 23 Apr 2024 09:55:03 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/WangenS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/PandeyS14,
  author       = {Pankaj Pandey and
                  Einar Arthur Snekkenes},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Using Prediction Markets to Hedge Information Security Risks},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_9},
  doi          = {10.1007/978-3-319-11851-2\_9},
  timestamp    = {Thu, 23 Sep 2021 11:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/PandeyS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/Snekkenes13,
  author       = {Einar Snekkenes},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Elisabeth de Leeuw and
                  Chris J. Mitchell},
  title        = {Position Paper: Privacy Risk Analysis Is about Understanding Conflicting
                  Incentives},
  booktitle    = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6
                  Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {396},
  pages        = {100--103},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37282-7\_9},
  doi          = {10.1007/978-3-642-37282-7\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idman/Snekkenes13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RajbhandariS13,
  author       = {Lisa Rajbhandari and
                  Einar Snekkenes},
  editor       = {Lech J. Janczewski and
                  Henry B. Wolfe and
                  Sujeet Shenoi},
  title        = {Using the Conflicting Incentives Risk Analysis Method},
  booktitle    = {Security and Privacy Protection in Information Processing Systems
                  - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland,
                  New Zealand, July 8-10, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {405},
  pages        = {315--329},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39218-4\_24},
  doi          = {10.1007/978-3-642-39218-4\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RajbhandariS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/RajbhandariS13,
  author       = {Lisa Rajbhandari and
                  Einar Snekkenes},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {Risk Acceptance and Rejection for Threat and Opportunity Risks in
                  Conflicting Incentives Risk Analysis},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 10th International
                  Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8058},
  pages        = {124--136},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40343-9\_11},
  doi          = {10.1007/978-3-642-40343-9\_11},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/RajbhandariS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/DyrkolbotnWS12,
  author       = {Geir Olav Dyrkolbotn and
                  Knut Wold and
                  Einar Snekkenes},
  title        = {Layout Dependent Phenomena {A} New Side-channel Power Model},
  journal      = {J. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {827--837},
  year         = {2012},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=124\&\#38;id=2045},
  doi          = {10.4304/JCP.7.4.827-837},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/DyrkolbotnWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/RajbhandariS12,
  author       = {Lisa Rajbhandari and
                  Einar Snekkenes},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Intended Actions: Risk Is Conflicting Incentives},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {370--386},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_23},
  doi          = {10.1007/978-3-642-33383-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/RajbhandariS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sivp/GafurovBS11,
  author       = {Davrondzhon Gafurov and
                  Patrick Bours and
                  Einar Snekkenes},
  title        = {User authentication based on foot motion},
  journal      = {Signal Image Video Process.},
  volume       = {5},
  number       = {4},
  pages        = {457--467},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11760-011-0249-1},
  doi          = {10.1007/S11760-011-0249-1},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sivp/GafurovBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/RajbhandariS11,
  author       = {Lisa Rajbhandari and
                  Einar Snekkenes},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {Mapping between Classical Risk Management and Game Theoretical Approaches},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {147--154},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_12},
  doi          = {10.1007/978-3-642-24712-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/RajbhandariS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/RajbhandariS11,
  author       = {Lisa Rajbhandari and
                  Einar Snekkenes},
  title        = {An approach to measure effectiveness of control for risk analysis
                  with game theory},
  booktitle    = {1st Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2011, Milan, Italy, September 8, 2011},
  pages        = {24--29},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/STAST.2011.6059252},
  doi          = {10.1109/STAST.2011.6059252},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/RajbhandariS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/GafurovSB10,
  author       = {Davrondzhon Gafurov and
                  Einar Snekkenes and
                  Patrick Bours},
  title        = {Improved Gait Recognition Performance Using Cycle Matching},
  booktitle    = {24th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13
                  April 2010},
  pages        = {836--841},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WAINA.2010.145},
  doi          = {10.1109/WAINA.2010.145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/GafurovSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DyrkolbotnWS10,
  author       = {Geir Olav Dyrkolbotn and
                  Knut Wold and
                  Einar Snekkenes},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Security Implications of Crosstalk in Switching {CMOS} Gates},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {269--275},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_23},
  doi          = {10.1007/978-3-642-18178-8\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DyrkolbotnWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/RajbhandariS10,
  author       = {Lisa Rajbhandari and
                  Einar Snekkenes},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Penny Duquenoy and
                  Marit Hansen and
                  Ronald Leenes and
                  Ge Zhang},
  title        = {Using Game Theory to Analyze Risk to Privacy: An Initial Insight},
  booktitle    = {Privacy and Identity Management for Life - 6th {IFIP} {WG} 9.2, 9.6/11.7,
                  11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden,
                  August 2-6, 2010, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {352},
  pages        = {41--51},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-20769-3\_4},
  doi          = {10.1007/978-3-642-20769-3\_4},
  timestamp    = {Fri, 05 Aug 2022 07:31:50 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/RajbhandariS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/GafurovS09,
  author       = {Davrondzhon Gafurov and
                  Einar Snekkenes},
  title        = {Gait Recognition Using Wearable Motion Recording Sensors},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/415817},
  doi          = {10.1155/2009/415817},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/GafurovS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/HelkalaS09,
  author       = {Kirsi Helkala and
                  Einar Snekkenes},
  title        = {Formalizing the ranking of authentication products},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {30--43},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220910944740},
  doi          = {10.1108/09685220910944740},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/HelkalaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/HelkalaS09,
  author       = {Kirsi Helkala and
                  Einar Snekkenes},
  title        = {Password Generation and Search Space Reduction},
  journal      = {J. Comput.},
  volume       = {4},
  number       = {7},
  pages        = {663--669},
  year         = {2009},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=102\&\#38;id=1665},
  doi          = {10.4304/JCP.4.7.663-669},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcp/HelkalaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgr/GafurovS08,
  author       = {Davrondzhon Gafurov and
                  Einar Snekkenes},
  title        = {Towards understanding the uniqueness of gait biometric},
  booktitle    = {8th {IEEE} International Conference on Automatic Face and Gesture
                  Recognition {(FG} 2008), Amsterdam, The Netherlands, 17-19 September
                  2008},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/AFGR.2008.4813383},
  doi          = {10.1109/AFGR.2008.4813383},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgr/GafurovS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/AndreassenS08,
  author       = {Freddy Andreassen and
                  Einar Snekkenes},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Security and privacy awareness of home {PC} users in Norway},
  booktitle    = {2nd International Conference on Human Aspects of Information Security
                  and Assurance, {HAISA} 2008, Plymouth, UK, July 8-9, 2008. Proceedings},
  pages        = {56--68},
  publisher    = {University of Plymouth},
  year         = {2008},
  url          = {http://www.cscan.org/openaccess/?paperid=47},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/AndreassenS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/HelkalaS08,
  author       = {Kirsi Helkala and
                  Einar Snekkenes},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {A method for ranking authentication products},
  booktitle    = {2nd International Conference on Human Aspects of Information Security
                  and Assurance, {HAISA} 2008, Plymouth, UK, July 8-9, 2008. Proceedings},
  pages        = {80--93},
  publisher    = {University of Plymouth},
  year         = {2008},
  url          = {http://www.cscan.org/openaccess/?paperid=45},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/HelkalaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/GafurovS08,
  author       = {Davrondzhon Gafurov and
                  Einar Snekkenes},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Arm Swing as a Weak Biometric for Unobtrusive User Authentication},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {1080--1087},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.47},
  doi          = {10.1109/IIH-MSP.2008.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/GafurovS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GafurovSB07,
  author       = {Davrondzhon Gafurov and
                  Einar Snekkenes and
                  Patrick Bours},
  title        = {Spoof Attacks on Gait Authentication System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {2},
  number       = {3-2},
  pages        = {491--502},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIFS.2007.902030},
  doi          = {10.1109/TIFS.2007.902030},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GafurovSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/autoid/GafurovSB07,
  author       = {Davrondzhon Gafurov and
                  Einar Snekkenes and
                  Patrick Bours},
  title        = {Gait Authentication and Identification Using Wearable Accelerometer
                  Sensor},
  booktitle    = {2007 {IEEE} Workshop on Automatic Identification Advanced Technologies,
                  AutoID 2007, Alghero, Italy, June 7-8, 2007},
  pages        = {220--225},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/AUTOID.2007.380623},
  doi          = {10.1109/AUTOID.2007.380623},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/autoid/GafurovSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/KosmerljFHS06,
  author       = {Marijana Kosmerlj and
                  Tom Fladsrud and
                  Erik Hjelm{\aa}s and
                  Einar Snekkenes},
  editor       = {David Zhang and
                  Anil K. Jain},
  title        = {Face Recognition Issues in a Border Control Environment},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2006, Hong
                  Kong, China, January 5-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3832},
  pages        = {33--39},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11608288\_5},
  doi          = {10.1007/11608288\_5},
  timestamp    = {Thu, 17 Oct 2019 12:39:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/KosmerljFHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DyrkolbotnS06,
  author       = {Geir Olav Dyrkolbotn and
                  Einar Snekkenes},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {A Wireless Covert Channel on Smart Cards (Short Paper)},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_18},
  doi          = {10.1007/11935308\_18},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/DyrkolbotnS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/GafurovSB06,
  author       = {Davrondzhon Gafurov and
                  Einar Snekkenes and
                  Tor Erik Buvarp},
  editor       = {Robert Meersman and
                  Zahir Tari and
                  Pilar Herrero},
  title        = {Robustness of Biometric Gait Authentication Against Impersonation
                  Attack},
  booktitle    = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,
                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
                  COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}
                  Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,
                  France, October 29 - November 3, 2006. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4277},
  pages        = {479--488},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11915034\_71},
  doi          = {10.1007/11915034\_71},
  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/GafurovSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Snekkenes05,
  author       = {Einar Snekkenes},
  title        = {Preface to the special issue on {ESORICS} 2003},
  journal      = {Int. J. Inf. Sec.},
  volume       = {4},
  number       = {3},
  pages        = {133--134},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10207-004-0054-8},
  doi          = {10.1007/S10207-004-0054-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Snekkenes05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HasleKKS05,
  author       = {H{\aa}gen Hasle and
                  Yngve Kristiansen and
                  Ketil Kintel and
                  Einar Snekkenes},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {Measuring Resistance to Social Engineering},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {132--143},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_12},
  doi          = {10.1007/978-3-540-31979-5\_12},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HasleKKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/LangwegS04,
  author       = {Hanno Langweg and
                  Einar Snekkenes},
  title        = {A classification of malicious software attacks},
  booktitle    = {Proceedings of the 23rd {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2004, April 15-17, 2004, Phoenix,
                  Arizona, {USA}},
  pages        = {827--832},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/PCCC.2004.1395194},
  doi          = {10.1109/PCCC.2004.1395194},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/LangwegS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2003,
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b13237},
  doi          = {10.1007/B13237},
  isbn         = {3-540-20300-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/Snekkenes01,
  author       = {Einar Snekkenes},
  editor       = {Michael P. Wellman and
                  Yoav Shoham},
  title        = {Concepts for personal location privacy policies},
  booktitle    = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001),
                  Tampa, Florida, USA, October 14-17, 2001},
  pages        = {48--57},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501158.501164},
  doi          = {10.1145/501158.501164},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigecom/Snekkenes01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Snekkenes92,
  author       = {Einar Snekkenes},
  title        = {Roles in cryptographic protocols},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {105--119},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213267},
  doi          = {10.1109/RISP.1992.213267},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Snekkenes92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GaarderS91,
  author       = {Klaus Gaarder and
                  Einar Snekkenes},
  title        = {Applying a Formal Analysis Technique to the {CCITT} {X.509} Strong
                  Two-Way Authentication Protocol},
  journal      = {J. Cryptol.},
  volume       = {3},
  number       = {2},
  pages        = {81--98},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF00196790},
  doi          = {10.1007/BF00196790},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GaarderS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Snekkenes91,
  author       = {Einar Snekkenes},
  title        = {Exploring the {BAN} Approach to Protocol Analysis},
  booktitle    = {Proceedings of the 1991 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 20-22, 1991},
  pages        = {171--181},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/RISP.1991.130785},
  doi          = {10.1109/RISP.1991.130785},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Snekkenes91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GaarderS90,
  author       = {Klaus Gaarder and
                  Einar Snekkenes},
  editor       = {Jennifer Seberry and
                  Josef Pieprzyk},
  title        = {On The Formal Analysis of {PKCS} Authentication Protocols},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
                  on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {453},
  pages        = {106--121},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0030355},
  doi          = {10.1007/BFB0030355},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GaarderS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pstv/Snekkenes90,
  author       = {Einar Snekkenes},
  editor       = {Luigi Logrippo and
                  Robert L. Probert and
                  Hasan Ural},
  title        = {Authentication in Open Systems},
  booktitle    = {Protocol Specification, Testing and Verification X, Proceedings of
                  the {IFIP} {WG6.1} Tenth International Symposium on Protocol Specification,
                  Testing and Verification, Ottawa, Ontario, Canada, 12-15 June, 1990},
  pages        = {311--324},
  publisher    = {North-Holland},
  year         = {1990},
  timestamp    = {Thu, 03 Jan 2002 12:07:46 +0100},
  biburl       = {https://dblp.org/rec/conf/pstv/Snekkenes90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics