BibTeX records: Svein J. Knapskog

download as .bib file

@article{DBLP:journals/jmc/ChenGK13,
  author       = {Yanling Chen and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {On a special class of multivariate quadratic quasigroups (MQQs)},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {111--141},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0006},
  doi          = {10.1515/JMC-2012-0006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/ChenGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/El-HadedyPK13,
  author       = {Mohamed El{-}Hadedy and
                  Georgios Pitsilis and
                  Svein J. Knapskog},
  title        = {An Efficient Authorship Protection Scheme for Shared Multimedia Content},
  journal      = {CoRR},
  volume       = {abs/1309.7640},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.7640},
  eprinttype    = {arXiv},
  eprint       = {1309.7640},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/El-HadedyPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-1004,
  author       = {Georgios Pitsilis and
                  Svein J. Knapskog},
  title        = {Social Trust as a solution to address sparsity-inherent problems of
                  Recommender systems},
  journal      = {CoRR},
  volume       = {abs/1208.1004},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.1004},
  eprinttype    = {arXiv},
  eprint       = {1208.1004},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-1004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ahs/El-HadedyGK11,
  author       = {Mohamed El{-}Hadedy and
                  Danilo Gligoroski and
                  Svein Johan Knapskog},
  editor       = {David Merodio and
                  Tughrul Arslan and
                  Umeshkumar D. Patel and
                  Didier Keymeulen and
                  Khaled Benkrid and
                  Ahmet T. Erdogan and
                  Michael Newell and
                  Luca Fossati and
                  Duane Armstrong},
  title        = {Area efficient processing element architecture for compact hash functions
                  systems on {VIRTEX5} {FPGA} platform},
  booktitle    = {2011 {NASA/ESA} Conference on Adaptive Hardware and Systems, {AHS}
                  2011, San Diego, California, USA, June 6-9, 2011},
  pages        = {240--247},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/AHS.2011.5963943},
  doi          = {10.1109/AHS.2011.5963943},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ahs/El-HadedyGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChiaK11,
  author       = {Pern Hui Chia and
                  Svein Johan Knapskog},
  editor       = {George Danezis},
  title        = {Re-evaluating the Wisdom of Crowds in Assessing Web Security},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {299--314},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_25},
  doi          = {10.1007/978-3-642-27576-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChiaK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icig/El-HadedyPK11,
  author       = {Mohamed El{-}Hadedy and
                  Georgios Pitsilis and
                  Svein J. Knapskog},
  title        = {An Efficient Authorship Protection Scheme for Shared Multimedia Content},
  booktitle    = {Sixth International Conference on Image and Graphics, {ICIG} 2011,
                  Hefei, Anhui, China, August 12-15, 2011},
  pages        = {914--919},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICIG.2011.183},
  doi          = {10.1109/ICIG.2011.183},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icig/El-HadedyPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/GligoroskiOJPFKM11,
  author       = {Danilo Gligoroski and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Rune Erlend Jensen and
                  Ludovic Perret and
                  Jean{-}Charles Faug{\`{e}}re and
                  Svein Johan Knapskog and
                  Smile Markovski},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {{MQQ-SIG} - An Ultra-Fast and Provably {CMA} Resistant Digital Signature
                  Scheme},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {184--203},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_13},
  doi          = {10.1007/978-3-642-32298-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/GligoroskiOJPFKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/TavakolifardK11,
  author       = {Mozhgan Tavakolifard and
                  Svein J. Knapskog},
  editor       = {William I. Grosky and
                  Youakim Badr and
                  Richard Chbeir},
  title        = {Trust evaluation initialization using contextual information},
  booktitle    = {{MEDES} '11: International {ACM} Conference on Management of Emergent
                  Digital EcoSystems, San Francisco, CA, USA, November 21-24, 2011},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2077489.2077491},
  doi          = {10.1145/2077489.2077491},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/medes/TavakolifardK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GligoroskiKAJ11,
  author       = {Danilo Gligoroski and
                  Svein Johan Knapskog and
                  J{\o}rn Amundsen and
                  Rune Erlend Jensen},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Internationally Standardized Efficient Cryptographic Hash Function},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {426--433},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GligoroskiKAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-3010,
  author       = {Ayu Tiwari and
                  Sudip Sanyal and
                  Ajith Abraham and
                  Svein Johan Knapskog and
                  Sugata Sanyal},
  title        = {A Multi-Factor Security Protocol for Wireless Payment - Secure Web
                  Authentication using Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/1111.3010},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.3010},
  eprinttype    = {arXiv},
  eprint       = {1111.3010},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-3010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/El-HadedyMGK10,
  author       = {Mohamed El{-}Hadedy and
                  Martin Margala and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {Resource-efficient implementation of Blue Midnight Wish-256 hash function
                  on Xilinx {FPGA} platform},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {44--47},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604066},
  doi          = {10.1109/ISIAS.2010.5604066},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/El-HadedyMGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ahs/El-HadedyPMK10,
  author       = {Mohamed El{-}Hadedy and
                  Sohan Purohit and
                  Martin Margala and
                  Svein J. Knapskog},
  editor       = {Tughrul Arslan and
                  Didier Keymeulen and
                  David Merodio and
                  Khaled Benkrid and
                  Ahmet T. Erdogan and
                  Umeshkumar D. Patel},
  title        = {Performance and area efficient transpose memory architecture for high
                  throughput adaptive signal processing systems},
  booktitle    = {2010 {NASA/ESA} Conference on Adaptive Hardware and Systems, {AHS}
                  2010, Anaheim, California, USA, June 15-18, 2010},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/AHS.2010.5546272},
  doi          = {10.1109/AHS.2010.5546272},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ahs/El-HadedyPMK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictinnovations/WestermannGK10,
  author       = {Benedikt Westermann and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  editor       = {Marjan Gusev and
                  Pece Mitrevski},
  title        = {Comparison of the Power Consumption of the 2nd Round {SHA-3} Candidates},
  booktitle    = {{ICT} Innovations 2010 - Second International Conference, {ICT} Innovations
                  2010, Ohrid, Macedonia, September 12-15, 2010. Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {83},
  pages        = {102--113},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19325-5\_11},
  doi          = {10.1007/978-3-642-19325-5\_11},
  timestamp    = {Sat, 19 Oct 2019 20:28:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ictinnovations/WestermannGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/El-HadedyMGK10,
  author       = {Mohamed El{-}Hadedy and
                  Martin Margala and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  editor       = {Viktor K. Prasanna and
                  J{\"{u}}rgen Becker and
                  Ren{\'{e}} Cumplido},
  title        = {Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5
                  {FPGA} Platform},
  booktitle    = {ReConFig'10: 2010 International Conference on Reconfigurable Computing
                  and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings},
  pages        = {394--399},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ReConFig.2010.44},
  doi          = {10.1109/RECONFIG.2010.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/El-HadedyMGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip6-6/2010,
  editor       = {Finn Arve Aagesen and
                  Svein J. Knapskog},
  title        = {Networked Services and Applications - Engineering, Control and Management,
                  16th {EUNICE/IFIP} {WG} 6.6 Workshop, {EUNICE} 2010, Trondheim, Norway,
                  June 28-30, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6164},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13971-0},
  doi          = {10.1007/978-3-642-13971-0},
  isbn         = {978-3-642-13970-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-6/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1010-3163,
  author       = {Danilo Gligoroski and
                  Svein Johan Knapskog and
                  Smile Markovski and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Rune Erlend Jensen and
                  Ludovic Perret and
                  Jean{-}Charles Faug{\`{e}}re},
  title        = {The Digital Signature Scheme {MQQ-SIG}},
  journal      = {CoRR},
  volume       = {abs/1010.3163},
  year         = {2010},
  url          = {http://arxiv.org/abs/1010.3163},
  eprinttype    = {arXiv},
  eprint       = {1010.3163},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1010-3163.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiOJPFKM10,
  author       = {Danilo Gligoroski and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Rune Erlend Jensen and
                  Ludovic Perret and
                  Jean{-}Charles Faug{\`{e}}re and
                  Svein Johan Knapskog and
                  Smile Markovski},
  title        = {The Digital Signature Scheme {MQQ-SIG}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiOJPFKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/El-HadedyGK10,
  author       = {Mohamed El{-}Hadedy and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {Single Core Implementation of Blue Midnight Wish Hash Function on
                  {VIRTEX} 5 Platform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/571},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/El-HadedyGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/TavakolifardHK09,
  author       = {Mozhgan Tavakolifard and
                  Peter Herrmann and
                  Svein J. Knapskog},
  editor       = {Elena Ferrari and
                  Ninghui Li and
                  Elisa Bertino and
                  Y{\"{u}}cel Karabulut},
  title        = {Inferring Trust Based on Similarity with {TILLIT}},
  booktitle    = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {300},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02056-8\_9},
  doi          = {10.1007/978-3-642-02056-8\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/TavakolifardHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/MoeHK09,
  author       = {Marie Elisabeth Gaup Moe and
                  Bjarne E. Helvik and
                  Svein J. Knapskog},
  editor       = {Elena Ferrari and
                  Ninghui Li and
                  Elisa Bertino and
                  Y{\"{u}}cel Karabulut},
  title        = {Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic
                  Environments},
  booktitle    = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {300},
  pages        = {283--297},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02056-8\_18},
  doi          = {10.1007/978-3-642-02056-8\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/MoeHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/MjaalandGK09,
  author       = {Bendik B. Mjaaland and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  editor       = {Jeng{-}Shyang Pan and
                  Yen{-}Wei Chen and
                  Lakhmi C. Jain},
  title        = {The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric
                  Infrastructure},
  booktitle    = {Fifth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14
                  September, 2009, Proceedings},
  pages        = {1066--1071},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IIH-MSP.2009.102},
  doi          = {10.1109/IIH-MSP.2009.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/MjaalandGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/El-HadedyGK09,
  author       = {Mohamed El{-}Hadedy and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  editor       = {Youakim Badr and
                  Santi Caball{\'{e}} and
                  Fatos Xhafa and
                  Ajith Abraham and
                  Bego{\~{n}}a Gros},
  title        = {Low Area Implementation of the Hash Function "Blue Midnight Wish
                  256" for {FPGA} Platforms},
  booktitle    = {1st International Conference on Intelligent Networking and Collaborative
                  Systems, INCoS 2009, Barcelona, Spain, 4-6 November 2009},
  pages        = {100--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/INCOS.2009.22},
  doi          = {10.1109/INCOS.2009.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/El-HadedyGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/WangZGK09,
  author       = {Wei Wang and
                  Xiangliang Zhang and
                  Sylvain Gombault and
                  Svein J. Knapskog},
  title        = {Attribute Normalization in Network Intrusion Detection},
  booktitle    = {The 10th International Symposium on Pervasive Systems, Algorithms,
                  and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009},
  pages        = {448--453},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/I-SPAN.2009.49},
  doi          = {10.1109/I-SPAN.2009.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispan/WangZGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangGK09,
  author       = {Wei Wang and
                  Thomas Guyet and
                  Svein J. Knapskog},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Autonomic Intrusion Detection System},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {359--361},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_24},
  doi          = {10.1007/978-3-642-04342-0\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/09/GligoroskiMK09,
  author       = {Danilo Gligoroski and
                  Smile Markovski and
                  Svein Johan Knapskog},
  editor       = {Massimiliano Sala and
                  Shojiro Sakata and
                  Teo Mora and
                  Carlo Traverso and
                  Ludovic Perret},
  title        = {A New Measure to Estimate Pseudo-Randomness of Boolean Functions and
                  Relations with Gr{\"{o}}bner Bases},
  booktitle    = {Gr{\"{o}}bner Bases, Coding, and Cryptography},
  pages        = {421--425},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-540-93806-4\_32},
  doi          = {10.1007/978-3-540-93806-4\_32},
  timestamp    = {Mon, 16 Sep 2019 14:43:20 +0200},
  biburl       = {https://dblp.org/rec/books/sp/09/GligoroskiMK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2009,
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4},
  doi          = {10.1007/978-3-642-04766-4},
  isbn         = {978-3-642-04765-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiams/HaslumAK08,
  author       = {Kjetil Haslum and
                  Ajith Abraham and
                  Svein J. Knapskog},
  title        = {HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment},
  booktitle    = {Second Asia International Conference on Modelling and Simulation,
                  {AMS} 2008, Kuala Lumpur, Malaysia, May 13-15, 2008},
  pages        = {631--636},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/AMS.2008.120},
  doi          = {10.1109/AMS.2008.120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiams/HaslumAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisim/Knapskog08,
  author       = {Svein J. Knapskog},
  editor       = {V{\'{a}}clav Sn{\'{a}}sel and
                  Ajith Abraham and
                  Khalid Saeed and
                  Jaroslav Pokorn{\'{y}}},
  title        = {New Cryptographic Primitives},
  booktitle    = {7th International Conference on Computer Information Systems and Industrial
                  Management Applications, {CISIM} 2008, Ostrava, Czech Republic, June
                  26-28, 2008},
  pages        = {3--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CISIM.2008.64},
  doi          = {10.1109/CISIM.2008.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisim/Knapskog08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/TavakolifardKH08,
  author       = {Mozhgan Tavakolifard and
                  Svein J. Knapskog and
                  Peter Herrmann},
  title        = {Cross-Situation Trust Reasoning},
  booktitle    = {Proceedings of the 2008 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia},
  pages        = {67--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WIIAT.2008.41},
  doi          = {10.1109/WIIAT.2008.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/TavakolifardKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GligoroskiAK08,
  author       = {Danilo Gligoroski and
                  Suzana Andova and
                  Svein J. Knapskog},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {On the Importance of the Key Separation Principle for Different Modes
                  of Operation},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_29},
  doi          = {10.1007/978-3-540-79104-1\_29},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GligoroskiAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/HaslumMK08,
  author       = {Kjetil Haslum and
                  Marie Elisabeth Gaup Moe and
                  Svein J. Knapskog},
  title        = {Real-time intrusion prevention and security analysis of networks using
                  HMMs},
  booktitle    = {{LCN} 2008, The 33rd {IEEE} Conference on Local Computer Networks,
                  The Conference on Leading Edge and Practical Computer Networking,
                  Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008,
                  Proceedings},
  pages        = {927--934},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/LCN.2008.4664305},
  doi          = {10.1109/LCN.2008.4664305},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/HaslumMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/MoeHK08,
  author       = {Marie Elisabeth Gaup Moe and
                  Bjarne E. Helvik and
                  Svein J. Knapskog},
  editor       = {Albert Y. Zomaya and
                  Matteo Cesana},
  title        = {{TSR:} trust-based secure {MANET} routing using HMMs},
  booktitle    = {Q2SWinet'08 - Proceedings of the 4th {ACM} Workshop on {Q2S} and Security
                  for Wireless and Mobile Networks, Vancouver, British Columbia, Canada,
                  October 27-28, 2008},
  pages        = {83--90},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1454586.1454602},
  doi          = {10.1145/1454586.1454602},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mswim/MoeHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/TavakolifardKH08,
  author       = {Mozhgan Tavakolifard and
                  Svein J. Knapskog and
                  Peter Herrmann},
  editor       = {Albert Y. Zomaya and
                  Matteo Cesana},
  title        = {Trust transferability among similar contexts},
  booktitle    = {Q2SWinet'08 - Proceedings of the 4th {ACM} Workshop on {Q2S} and Security
                  for Wireless and Mobile Networks, Vancouver, British Columbia, Canada,
                  October 27-28, 2008},
  pages        = {91--97},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1454586.1454603},
  doi          = {10.1145/1454586.1454603},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mswim/TavakolifardKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/reconfig/El-HadedyGK08,
  author       = {Mohamed El{-}Hadedy and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {High Performance Implementation of a Public Key Block Cipher - MQQ,
                  for {FPGA} Platforms},
  booktitle    = {ReConFig'08: 2008 International Conference on Reconfigurable Computing
                  and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings},
  pages        = {427--432},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ReConFig.2008.11},
  doi          = {10.1109/RECONFIG.2008.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/reconfig/El-HadedyGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uksim/HaslumAK08,
  author       = {Kjetil Haslum and
                  Ajith Abraham and
                  Svein Johan Knapskog},
  editor       = {David Al{-}Dabass and
                  Alessandra Orsoni and
                  Adam Brentnall and
                  Ajith Abraham and
                  Richard N. Zobel},
  title        = {Fuzzy Online Risk Assessment for Distributed Intrusion Prediction
                  and Prevention Systems},
  booktitle    = {Proceedings of the 10th EUROS/UKSim International Conference on Computer
                  Modelling and Simulation, Cambridge University, Emmanuel College,
                  Cambridge, UK, 1-3 April 2008},
  pages        = {216--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/UKSIM.2008.30},
  doi          = {10.1109/UKSIM.2008.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uksim/HaslumAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/TavakolifardK09,
  author       = {Mozhgan Tavakolifard and
                  Svein J. Knapskog},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {A Probabilistic Reputation Algorithm for Decentralized Multi-Agent
                  Environments},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {139--149},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.043},
  doi          = {10.1016/J.ENTCS.2009.07.043},
  timestamp    = {Thu, 09 Mar 2023 13:54:01 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/TavakolifardK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/GligoroskiMK08,
  author       = {Danilo Gligoroski and
                  Smile Markovski and
                  Svein J. Knapskog},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {The Stream Cipher Edon80},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {152--169},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_12},
  doi          = {10.1007/978-3-540-68351-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/GligoroskiMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0808-0247,
  author       = {Danilo Gligoroski and
                  Smile Markovski and
                  Svein J. Knapskog},
  title        = {A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups},
  journal      = {CoRR},
  volume       = {abs/0808.0247},
  year         = {2008},
  url          = {http://arxiv.org/abs/0808.0247},
  eprinttype    = {arXiv},
  eprint       = {0808.0247},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0808-0247.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiMK08,
  author       = {Danilo Gligoroski and
                  Smile Markovski and
                  Svein J. Knapskog},
  title        = {Public Key Block Cipher Based on Multivariate Quadratic Quasigroups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/El-HadedyGK08,
  author       = {Mohamed El{-}Hadedy and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {High Performance Implementation of a Public Key Block Cipher - MQQ,
                  for {FPGA} Platforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/339},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/El-HadedyGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/StojanovskiGGK07,
  author       = {Nenad Stojanovski and
                  Marjan Gusev and
                  Danilo Gligoroski and
                  Svein J. Knapskog},
  title        = {Bypassing Data Execution Prevention on MicrosoftWindows {XP} {SP2}},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {1222--1226},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.54},
  doi          = {10.1109/ARES.2007.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/StojanovskiGGK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HaslumAK07,
  author       = {Kjetil Haslum and
                  Ajith Abraham and
                  Svein J. Knapskog},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {{DIPS:} {A} Framework for Distributed Intrusion Prediction and Prevention
                  Using Hidden Markov Models and Online Fuzzy Risk Assessment},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {183--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.67},
  doi          = {10.1109/IAS.2007.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HaslumAK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiK07,
  author       = {Danilo Gligoroski and
                  Svein Johan Knapskog},
  title        = {Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R\} Family
                  of Cryptographic Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiK07a,
  author       = {Danilo Gligoroski and
                  Svein Johan Knapskog},
  title        = {Turbo {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiK07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/SallhammarHK06,
  author       = {Karin Sallhammar and
                  Bjarne E. Helvik and
                  Svein J. Knapskog},
  title        = {On Stochastic Modeling for Integrated Security and Dependability Evaluation},
  journal      = {J. Networks},
  volume       = {1},
  number       = {5},
  pages        = {31--42},
  year         = {2006},
  url          = {https://doi.org/10.4304/jnw.1.5.31-42},
  doi          = {10.4304/JNW.1.5.31-42},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/SallhammarHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SallhammarHK06,
  author       = {Karin Sallhammar and
                  Bjarne E. Helvik and
                  Svein J. Knapskog},
  title        = {Towards a Stochastic Model for Integrated Security and Dependability
                  Evaluation},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {156--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.137},
  doi          = {10.1109/ARES.2006.137},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SallhammarHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/GligoroskiKA06,
  author       = {Danilo Gligoroski and
                  Svein J. Knapskog and
                  Suzana Andova},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Cryptcoding - Encryption and Error-Correction Coding in a Single Step},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {145--151},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 06 Dec 2006 10:51:51 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/GligoroskiKA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/SallhammarHK06,
  author       = {Karin Sallhammar and
                  Bjarne E. Helvik and
                  Svein J. Knapskog},
  title        = {A Game-Theoretic Approach to Stochastic Security and Dependability
                  Evaluation},
  booktitle    = {Second International Symposium on Dependable Autonomic and Secure
                  Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis,
                  Indiana, {USA}},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/DASC.2006.7},
  doi          = {10.1109/DASC.2006.7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/SallhammarHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ArnesSHBMK05,
  author       = {Andr{\'{e}} {\AA}rnes and
                  Karin Sallhammar and
                  Kjetil Haslum and
                  T{\o}nnes Brekne and
                  Marie Elisabeth Gaup Moe and
                  Svein J. Knapskog},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Real-Time Risk Assessment with Network Sensors and Intrusion Detection
                  Systems},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {388--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_57},
  doi          = {10.1007/11596981\_57},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ArnesSHBMK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/SallhammarHK05,
  author       = {Karin Sallhammar and
                  Bjarne E. Helvik and
                  Svein J. Knapskog},
  editor       = {Hamid R. Arabnia},
  title        = {Incorporating Attacker Behavior in Stochastic Models of Security},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {79--85},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/SallhammarHK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/SallhammarKH05,
  author       = {Karin Sallhammar and
                  Svein J. Knapskog and
                  Bjarne E. Helvik},
  title        = {Using Stochastic Game Theory to Compute the Expected Behavior of Attackers},
  booktitle    = {2005 {IEEE/IPSJ} International Symposium on Applications and the Internet
                  Workshops {(SAINT} 2005 Workshops), 31 January - 4 February 2005,
                  Trento, Italy},
  pages        = {102--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SAINTW.2005.1619988},
  doi          = {10.1109/SAINTW.2005.1619988},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/SallhammarKH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/JosangBK04,
  author       = {Audun J{\o}sang and
                  Daniel Bradley and
                  Svein J. Knapskog},
  editor       = {James M. Hogan and
                  Paul Montague and
                  Martin K. Purvis and
                  Chris Steketee},
  title        = {Belief-Based Risk Analysis},
  booktitle    = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information
                  Security Workshop (AISW2004), the Australasian Workshop on Data Mining
                  and Web Intelligence (DMWI2004), and the Australasian Workshop on
                  Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand,
                  January 2004},
  series       = {{CRPIT}},
  volume       = {32},
  pages        = {63--68},
  publisher    = {Australian Computer Society},
  year         = {2004},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Josang.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/JosangBK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/JosangLKV97,
  author       = {Audun J{\o}sang and
                  F. Van Laenen and
                  Svein J. Knapskog and
                  Joos Vandewalle},
  editor       = {Louise Yngstr{\"{o}}m and
                  Jan Carlsen},
  title        = {How to trust systems},
  booktitle    = {Information Security in Research and Business, Proceedings of the
                  {IFIP} {TC11} 13th International Conference on Information Security
                  {(SEC} '97), 14-16 May 1997, Copenhagen, Denmark},
  series       = {{IFIP} Conference Proceedings},
  volume       = {92},
  pages        = {241--252},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Thu, 03 Jan 2002 12:08:24 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/JosangLKV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Knapskog90,
  author       = {Svein J. Knapskog},
  editor       = {Jennifer Seberry and
                  Josef Pieprzyk},
  title        = {Formal Specification and Verification of Secure Communication Protocols},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
                  on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {453},
  pages        = {58--73},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0030352},
  doi          = {10.1007/BFB0030352},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Knapskog90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Knapskog88,
  author       = {Svein J. Knapskog},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Privacy Protected Payments - Realization of a Protocol that Guarantees
                  Payer Anonymity},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {107--122},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_10},
  doi          = {10.1007/3-540-45961-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Knapskog88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/RosteHK80,
  author       = {Terje R{\o}ste and
                  Nils Holte and
                  Svein J. Knapskog},
  title        = {A 140 Mbits/s Digital Transmission System for Coaxial Cable Using
                  Partial Response Class 1 Line Code with Quantized Feedback},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {28},
  number       = {8},
  pages        = {1425--1430},
  year         = {1980},
  url          = {https://doi.org/10.1109/TCOM.1980.1094786},
  doi          = {10.1109/TCOM.1980.1094786},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/RosteHK80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics