Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Svein J. Knapskog
@article{DBLP:journals/jmc/ChenGK13, author = {Yanling Chen and Danilo Gligoroski and Svein J. Knapskog}, title = {On a special class of multivariate quadratic quasigroups (MQQs)}, journal = {J. Math. Cryptol.}, volume = {7}, number = {2}, pages = {111--141}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0006}, doi = {10.1515/JMC-2012-0006}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/ChenGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/El-HadedyPK13, author = {Mohamed El{-}Hadedy and Georgios Pitsilis and Svein J. Knapskog}, title = {An Efficient Authorship Protection Scheme for Shared Multimedia Content}, journal = {CoRR}, volume = {abs/1309.7640}, year = {2013}, url = {http://arxiv.org/abs/1309.7640}, eprinttype = {arXiv}, eprint = {1309.7640}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/El-HadedyPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-1004, author = {Georgios Pitsilis and Svein J. Knapskog}, title = {Social Trust as a solution to address sparsity-inherent problems of Recommender systems}, journal = {CoRR}, volume = {abs/1208.1004}, year = {2012}, url = {http://arxiv.org/abs/1208.1004}, eprinttype = {arXiv}, eprint = {1208.1004}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-1004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ahs/El-HadedyGK11, author = {Mohamed El{-}Hadedy and Danilo Gligoroski and Svein Johan Knapskog}, editor = {David Merodio and Tughrul Arslan and Umeshkumar D. Patel and Didier Keymeulen and Khaled Benkrid and Ahmet T. Erdogan and Michael Newell and Luca Fossati and Duane Armstrong}, title = {Area efficient processing element architecture for compact hash functions systems on {VIRTEX5} {FPGA} platform}, booktitle = {2011 {NASA/ESA} Conference on Adaptive Hardware and Systems, {AHS} 2011, San Diego, California, USA, June 6-9, 2011}, pages = {240--247}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/AHS.2011.5963943}, doi = {10.1109/AHS.2011.5963943}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ahs/El-HadedyGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChiaK11, author = {Pern Hui Chia and Svein Johan Knapskog}, editor = {George Danezis}, title = {Re-evaluating the Wisdom of Crowds in Assessing Web Security}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {299--314}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_25}, doi = {10.1007/978-3-642-27576-0\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChiaK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/El-HadedyPK11, author = {Mohamed El{-}Hadedy and Georgios Pitsilis and Svein J. Knapskog}, title = {An Efficient Authorship Protection Scheme for Shared Multimedia Content}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {914--919}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.183}, doi = {10.1109/ICIG.2011.183}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/El-HadedyPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/GligoroskiOJPFKM11, author = {Danilo Gligoroski and Rune Steinsmo {\O}deg{\aa}rd and Rune Erlend Jensen and Ludovic Perret and Jean{-}Charles Faug{\`{e}}re and Svein Johan Knapskog and Smile Markovski}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {{MQQ-SIG} - An Ultra-Fast and Provably {CMA} Resistant Digital Signature Scheme}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {184--203}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_13}, doi = {10.1007/978-3-642-32298-3\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/GligoroskiOJPFKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/TavakolifardK11, author = {Mozhgan Tavakolifard and Svein J. Knapskog}, editor = {William I. Grosky and Youakim Badr and Richard Chbeir}, title = {Trust evaluation initialization using contextual information}, booktitle = {{MEDES} '11: International {ACM} Conference on Management of Emergent Digital EcoSystems, San Francisco, CA, USA, November 21-24, 2011}, pages = {1--8}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2077489.2077491}, doi = {10.1145/2077489.2077491}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medes/TavakolifardK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GligoroskiKAJ11, author = {Danilo Gligoroski and Svein Johan Knapskog and J{\o}rn Amundsen and Rune Erlend Jensen}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Internationally Standardized Efficient Cryptographic Hash Function}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {426--433}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GligoroskiKAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-3010, author = {Ayu Tiwari and Sudip Sanyal and Ajith Abraham and Svein Johan Knapskog and Sugata Sanyal}, title = {A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices}, journal = {CoRR}, volume = {abs/1111.3010}, year = {2011}, url = {http://arxiv.org/abs/1111.3010}, eprinttype = {arXiv}, eprint = {1111.3010}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-3010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/El-HadedyMGK10, author = {Mohamed El{-}Hadedy and Martin Margala and Danilo Gligoroski and Svein J. Knapskog}, title = {Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx {FPGA} platform}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {44--47}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604066}, doi = {10.1109/ISIAS.2010.5604066}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/El-HadedyMGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ahs/El-HadedyPMK10, author = {Mohamed El{-}Hadedy and Sohan Purohit and Martin Margala and Svein J. Knapskog}, editor = {Tughrul Arslan and Didier Keymeulen and David Merodio and Khaled Benkrid and Ahmet T. Erdogan and Umeshkumar D. Patel}, title = {Performance and area efficient transpose memory architecture for high throughput adaptive signal processing systems}, booktitle = {2010 {NASA/ESA} Conference on Adaptive Hardware and Systems, {AHS} 2010, Anaheim, California, USA, June 15-18, 2010}, pages = {113--120}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/AHS.2010.5546272}, doi = {10.1109/AHS.2010.5546272}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ahs/El-HadedyPMK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictinnovations/WestermannGK10, author = {Benedikt Westermann and Danilo Gligoroski and Svein J. Knapskog}, editor = {Marjan Gusev and Pece Mitrevski}, title = {Comparison of the Power Consumption of the 2nd Round {SHA-3} Candidates}, booktitle = {{ICT} Innovations 2010 - Second International Conference, {ICT} Innovations 2010, Ohrid, Macedonia, September 12-15, 2010. Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {83}, pages = {102--113}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19325-5\_11}, doi = {10.1007/978-3-642-19325-5\_11}, timestamp = {Sat, 19 Oct 2019 20:28:52 +0200}, biburl = {https://dblp.org/rec/conf/ictinnovations/WestermannGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/El-HadedyMGK10, author = {Mohamed El{-}Hadedy and Martin Margala and Danilo Gligoroski and Svein J. Knapskog}, editor = {Viktor K. Prasanna and J{\"{u}}rgen Becker and Ren{\'{e}} Cumplido}, title = {Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5 {FPGA} Platform}, booktitle = {ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 13-15 December 2010, Proceedings}, pages = {394--399}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ReConFig.2010.44}, doi = {10.1109/RECONFIG.2010.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/El-HadedyMGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip6-6/2010, editor = {Finn Arve Aagesen and Svein J. Knapskog}, title = {Networked Services and Applications - Engineering, Control and Management, 16th {EUNICE/IFIP} {WG} 6.6 Workshop, {EUNICE} 2010, Trondheim, Norway, June 28-30, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6164}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13971-0}, doi = {10.1007/978-3-642-13971-0}, isbn = {978-3-642-13970-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-6/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1010-3163, author = {Danilo Gligoroski and Svein Johan Knapskog and Smile Markovski and Rune Steinsmo {\O}deg{\aa}rd and Rune Erlend Jensen and Ludovic Perret and Jean{-}Charles Faug{\`{e}}re}, title = {The Digital Signature Scheme {MQQ-SIG}}, journal = {CoRR}, volume = {abs/1010.3163}, year = {2010}, url = {http://arxiv.org/abs/1010.3163}, eprinttype = {arXiv}, eprint = {1010.3163}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1010-3163.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiOJPFKM10, author = {Danilo Gligoroski and Rune Steinsmo {\O}deg{\aa}rd and Rune Erlend Jensen and Ludovic Perret and Jean{-}Charles Faug{\`{e}}re and Svein Johan Knapskog and Smile Markovski}, title = {The Digital Signature Scheme {MQQ-SIG}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2010}, url = {http://eprint.iacr.org/2010/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiOJPFKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/El-HadedyGK10, author = {Mohamed El{-}Hadedy and Danilo Gligoroski and Svein J. Knapskog}, title = {Single Core Implementation of Blue Midnight Wish Hash Function on {VIRTEX} 5 Platform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2010}, url = {http://eprint.iacr.org/2010/571}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/El-HadedyGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/TavakolifardHK09, author = {Mozhgan Tavakolifard and Peter Herrmann and Svein J. Knapskog}, editor = {Elena Ferrari and Ninghui Li and Elisa Bertino and Y{\"{u}}cel Karabulut}, title = {Inferring Trust Based on Similarity with {TILLIT}}, booktitle = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {300}, pages = {133--148}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02056-8\_9}, doi = {10.1007/978-3-642-02056-8\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/TavakolifardHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/MoeHK09, author = {Marie Elisabeth Gaup Moe and Bjarne E. Helvik and Svein J. Knapskog}, editor = {Elena Ferrari and Ninghui Li and Elisa Bertino and Y{\"{u}}cel Karabulut}, title = {Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments}, booktitle = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {300}, pages = {283--297}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02056-8\_18}, doi = {10.1007/978-3-642-02056-8\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/MoeHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/MjaalandGK09, author = {Bendik B. Mjaaland and Danilo Gligoroski and Svein J. Knapskog}, editor = {Jeng{-}Shyang Pan and Yen{-}Wei Chen and Lakhmi C. Jain}, title = {The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure}, booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings}, pages = {1066--1071}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IIH-MSP.2009.102}, doi = {10.1109/IIH-MSP.2009.102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/MjaalandGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/El-HadedyGK09, author = {Mohamed El{-}Hadedy and Danilo Gligoroski and Svein J. Knapskog}, editor = {Youakim Badr and Santi Caball{\'{e}} and Fatos Xhafa and Ajith Abraham and Bego{\~{n}}a Gros}, title = {Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for {FPGA} Platforms}, booktitle = {1st International Conference on Intelligent Networking and Collaborative Systems, INCoS 2009, Barcelona, Spain, 4-6 November 2009}, pages = {100--104}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/INCOS.2009.22}, doi = {10.1109/INCOS.2009.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/El-HadedyGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispan/WangZGK09, author = {Wei Wang and Xiangliang Zhang and Sylvain Gombault and Svein J. Knapskog}, title = {Attribute Normalization in Network Intrusion Detection}, booktitle = {The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009}, pages = {448--453}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/I-SPAN.2009.49}, doi = {10.1109/I-SPAN.2009.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispan/WangZGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangGK09, author = {Wei Wang and Thomas Guyet and Svein J. Knapskog}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Autonomic Intrusion Detection System}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {359--361}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_24}, doi = {10.1007/978-3-642-04342-0\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/09/GligoroskiMK09, author = {Danilo Gligoroski and Smile Markovski and Svein Johan Knapskog}, editor = {Massimiliano Sala and Shojiro Sakata and Teo Mora and Carlo Traverso and Ludovic Perret}, title = {A New Measure to Estimate Pseudo-Randomness of Boolean Functions and Relations with Gr{\"{o}}bner Bases}, booktitle = {Gr{\"{o}}bner Bases, Coding, and Cryptography}, pages = {421--425}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-540-93806-4\_32}, doi = {10.1007/978-3-540-93806-4\_32}, timestamp = {Mon, 16 Sep 2019 14:43:20 +0200}, biburl = {https://dblp.org/rec/books/sp/09/GligoroskiMK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2009, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4}, doi = {10.1007/978-3-642-04766-4}, isbn = {978-3-642-04765-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiams/HaslumAK08, author = {Kjetil Haslum and Ajith Abraham and Svein J. Knapskog}, title = {HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment}, booktitle = {Second Asia International Conference on Modelling and Simulation, {AMS} 2008, Kuala Lumpur, Malaysia, May 13-15, 2008}, pages = {631--636}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/AMS.2008.120}, doi = {10.1109/AMS.2008.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiams/HaslumAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisim/Knapskog08, author = {Svein J. Knapskog}, editor = {V{\'{a}}clav Sn{\'{a}}sel and Ajith Abraham and Khalid Saeed and Jaroslav Pokorn{\'{y}}}, title = {New Cryptographic Primitives}, booktitle = {7th International Conference on Computer Information Systems and Industrial Management Applications, {CISIM} 2008, Ostrava, Czech Republic, June 26-28, 2008}, pages = {3--7}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CISIM.2008.64}, doi = {10.1109/CISIM.2008.64}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisim/Knapskog08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/TavakolifardKH08, author = {Mozhgan Tavakolifard and Svein J. Knapskog and Peter Herrmann}, title = {Cross-Situation Trust Reasoning}, booktitle = {Proceedings of the 2008 {IEEE/WIC/ACM} International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia}, pages = {67--71}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WIIAT.2008.41}, doi = {10.1109/WIIAT.2008.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/TavakolifardKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GligoroskiAK08, author = {Danilo Gligoroski and Suzana Andova and Svein J. Knapskog}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {On the Importance of the Key Separation Principle for Different Modes of Operation}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {404--418}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_29}, doi = {10.1007/978-3-540-79104-1\_29}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GligoroskiAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/HaslumMK08, author = {Kjetil Haslum and Marie Elisabeth Gaup Moe and Svein J. Knapskog}, title = {Real-time intrusion prevention and security analysis of networks using HMMs}, booktitle = {{LCN} 2008, The 33rd {IEEE} Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings}, pages = {927--934}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/LCN.2008.4664305}, doi = {10.1109/LCN.2008.4664305}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/HaslumMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/MoeHK08, author = {Marie Elisabeth Gaup Moe and Bjarne E. Helvik and Svein J. Knapskog}, editor = {Albert Y. Zomaya and Matteo Cesana}, title = {{TSR:} trust-based secure {MANET} routing using HMMs}, booktitle = {Q2SWinet'08 - Proceedings of the 4th {ACM} Workshop on {Q2S} and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008}, pages = {83--90}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1454586.1454602}, doi = {10.1145/1454586.1454602}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mswim/MoeHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/TavakolifardKH08, author = {Mozhgan Tavakolifard and Svein J. Knapskog and Peter Herrmann}, editor = {Albert Y. Zomaya and Matteo Cesana}, title = {Trust transferability among similar contexts}, booktitle = {Q2SWinet'08 - Proceedings of the 4th {ACM} Workshop on {Q2S} and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008}, pages = {91--97}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1454586.1454603}, doi = {10.1145/1454586.1454603}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mswim/TavakolifardKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/reconfig/El-HadedyGK08, author = {Mohamed El{-}Hadedy and Danilo Gligoroski and Svein J. Knapskog}, title = {High Performance Implementation of a Public Key Block Cipher - MQQ, for {FPGA} Platforms}, booktitle = {ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings}, pages = {427--432}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ReConFig.2008.11}, doi = {10.1109/RECONFIG.2008.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/reconfig/El-HadedyGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uksim/HaslumAK08, author = {Kjetil Haslum and Ajith Abraham and Svein Johan Knapskog}, editor = {David Al{-}Dabass and Alessandra Orsoni and Adam Brentnall and Ajith Abraham and Richard N. Zobel}, title = {Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems}, booktitle = {Proceedings of the 10th EUROS/UKSim International Conference on Computer Modelling and Simulation, Cambridge University, Emmanuel College, Cambridge, UK, 1-3 April 2008}, pages = {216--223}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/UKSIM.2008.30}, doi = {10.1109/UKSIM.2008.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uksim/HaslumAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/TavakolifardK09, author = {Mozhgan Tavakolifard and Svein J. Knapskog}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {139--149}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.043}, doi = {10.1016/J.ENTCS.2009.07.043}, timestamp = {Thu, 09 Mar 2023 13:54:01 +0100}, biburl = {https://dblp.org/rec/journals/entcs/TavakolifardK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/GligoroskiMK08, author = {Danilo Gligoroski and Smile Markovski and Svein J. Knapskog}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {The Stream Cipher Edon80}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {152--169}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_12}, doi = {10.1007/978-3-540-68351-3\_12}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/series/lncs/GligoroskiMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0808-0247, author = {Danilo Gligoroski and Smile Markovski and Svein J. Knapskog}, title = {A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups}, journal = {CoRR}, volume = {abs/0808.0247}, year = {2008}, url = {http://arxiv.org/abs/0808.0247}, eprinttype = {arXiv}, eprint = {0808.0247}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0808-0247.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiMK08, author = {Danilo Gligoroski and Smile Markovski and Svein J. Knapskog}, title = {Public Key Block Cipher Based on Multivariate Quadratic Quasigroups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2008}, url = {http://eprint.iacr.org/2008/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/El-HadedyGK08, author = {Mohamed El{-}Hadedy and Danilo Gligoroski and Svein J. Knapskog}, title = {High Performance Implementation of a Public Key Block Cipher - MQQ, for {FPGA} Platforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2008}, url = {http://eprint.iacr.org/2008/339}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/El-HadedyGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/StojanovskiGGK07, author = {Nenad Stojanovski and Marjan Gusev and Danilo Gligoroski and Svein J. Knapskog}, title = {Bypassing Data Execution Prevention on MicrosoftWindows {XP} {SP2}}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {1222--1226}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.54}, doi = {10.1109/ARES.2007.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/StojanovskiGGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HaslumAK07, author = {Kjetil Haslum and Ajith Abraham and Svein J. Knapskog}, editor = {Ning Zhang and Ajith Abraham}, title = {{DIPS:} {A} Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {183--190}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.67}, doi = {10.1109/IAS.2007.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HaslumAK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiK07, author = {Danilo Gligoroski and Svein Johan Knapskog}, title = {Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R\} Family of Cryptographic Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2007}, url = {http://eprint.iacr.org/2007/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiK07a, author = {Danilo Gligoroski and Svein Johan Knapskog}, title = {Turbo {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2007}, url = {http://eprint.iacr.org/2007/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/SallhammarHK06, author = {Karin Sallhammar and Bjarne E. Helvik and Svein J. Knapskog}, title = {On Stochastic Modeling for Integrated Security and Dependability Evaluation}, journal = {J. Networks}, volume = {1}, number = {5}, pages = {31--42}, year = {2006}, url = {https://doi.org/10.4304/jnw.1.5.31-42}, doi = {10.4304/JNW.1.5.31-42}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/SallhammarHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SallhammarHK06, author = {Karin Sallhammar and Bjarne E. Helvik and Svein J. Knapskog}, title = {Towards a Stochastic Model for Integrated Security and Dependability Evaluation}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {156--165}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.137}, doi = {10.1109/ARES.2006.137}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SallhammarHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/GligoroskiKA06, author = {Danilo Gligoroski and Svein J. Knapskog and Suzana Andova}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Cryptcoding - Encryption and Error-Correction Coding in a Single Step}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {145--151}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 06 Dec 2006 10:51:51 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/GligoroskiKA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/SallhammarHK06, author = {Karin Sallhammar and Bjarne E. Helvik and Svein J. Knapskog}, title = {A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation}, booktitle = {Second International Symposium on Dependable Autonomic and Secure Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis, Indiana, {USA}}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/DASC.2006.7}, doi = {10.1109/DASC.2006.7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/SallhammarHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ArnesSHBMK05, author = {Andr{\'{e}} {\AA}rnes and Karin Sallhammar and Kjetil Haslum and T{\o}nnes Brekne and Marie Elisabeth Gaup Moe and Svein J. Knapskog}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {388--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_57}, doi = {10.1007/11596981\_57}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ArnesSHBMK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/SallhammarHK05, author = {Karin Sallhammar and Bjarne E. Helvik and Svein J. Knapskog}, editor = {Hamid R. Arabnia}, title = {Incorporating Attacker Behavior in Stochastic Models of Security}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {79--85}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/SallhammarHK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/SallhammarKH05, author = {Karin Sallhammar and Svein J. Knapskog and Bjarne E. Helvik}, title = {Using Stochastic Game Theory to Compute the Expected Behavior of Attackers}, booktitle = {2005 {IEEE/IPSJ} International Symposium on Applications and the Internet Workshops {(SAINT} 2005 Workshops), 31 January - 4 February 2005, Trento, Italy}, pages = {102--105}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SAINTW.2005.1619988}, doi = {10.1109/SAINTW.2005.1619988}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/SallhammarKH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/JosangBK04, author = {Audun J{\o}sang and Daniel Bradley and Svein J. Knapskog}, editor = {James M. Hogan and Paul Montague and Martin K. Purvis and Chris Steketee}, title = {Belief-Based Risk Analysis}, booktitle = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information Security Workshop (AISW2004), the Australasian Workshop on Data Mining and Web Intelligence (DMWI2004), and the Australasian Workshop on Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand, January 2004}, series = {{CRPIT}}, volume = {32}, pages = {63--68}, publisher = {Australian Computer Society}, year = {2004}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Josang.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/JosangBK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/JosangLKV97, author = {Audun J{\o}sang and F. Van Laenen and Svein J. Knapskog and Joos Vandewalle}, editor = {Louise Yngstr{\"{o}}m and Jan Carlsen}, title = {How to trust systems}, booktitle = {Information Security in Research and Business, Proceedings of the {IFIP} {TC11} 13th International Conference on Information Security {(SEC} '97), 14-16 May 1997, Copenhagen, Denmark}, series = {{IFIP} Conference Proceedings}, volume = {92}, pages = {241--252}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Thu, 03 Jan 2002 12:08:24 +0100}, biburl = {https://dblp.org/rec/conf/sec/JosangLKV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Knapskog90, author = {Svein J. Knapskog}, editor = {Jennifer Seberry and Josef Pieprzyk}, title = {Formal Specification and Verification of Secure Communication Protocols}, booktitle = {Advances in Cryptology - {AUSCRYPT} '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {453}, pages = {58--73}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0030352}, doi = {10.1007/BFB0030352}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Knapskog90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Knapskog88, author = {Svein J. Knapskog}, editor = {Christoph G. G{\"{u}}nther}, title = {Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {107--122}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_10}, doi = {10.1007/3-540-45961-8\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Knapskog88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/RosteHK80, author = {Terje R{\o}ste and Nils Holte and Svein J. Knapskog}, title = {A 140 Mbits/s Digital Transmission System for Coaxial Cable Using Partial Response Class 1 Line Code with Quantized Feedback}, journal = {{IEEE} Trans. Commun.}, volume = {28}, number = {8}, pages = {1425--1430}, year = {1980}, url = {https://doi.org/10.1109/TCOM.1980.1094786}, doi = {10.1109/TCOM.1980.1094786}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/RosteHK80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.