default search action
Stig Fr. Mjølsnes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j6]Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Private Identification of Subscribers in Mobile Networks: Status and Challenges. IEEE Commun. Mag. 57(9): 138-144 (2019) - [j5]Christian Sørseth, Xianyu Shelley Zhou, Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging. Wirel. Pers. Commun. 109(1): 675-693 (2019) - 2018
- [i6]Christian Sørseth, Xianyu Shelley Zhou, Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging. CoRR abs/1807.11350 (2018) - 2017
- [c21]Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Introducing Mobile Network Security Experiments to Communication Technology Education. World Conference on Information Security Education 2017: 74-83 - [c20]Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Easy 4G/LTE IMSI Catchers for Non-Programmers. MMM-ACNS 2017: 235-246 - [c19]Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Experimental Assessment of Private Information Disclosure in LTE Mobile Networks. SECRYPT 2017: 507-512 - [i5]Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Easy 4G/LTE IMSI Catchers for Non-Programmers. CoRR abs/1702.04434 (2017) - 2016
- [c18]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016: 55-71 - [c17]Herman Galteland, Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. Mycrypt 2016: 463-473 - [e3]Frank Stajano, Stig Fr. Mjølsnes, Graeme Jenkinson, Per Thorsheim:
Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings. Lecture Notes in Computer Science 9551, Springer 2016, ISBN 978-3-319-29937-2 [contents] - [i4]Herman Galteland, Stig Fr. Mjølsnes, Ruxandra F. Olimid:
Attacks on cMix - Some Small Overlooked Details. IACR Cryptol. ePrint Arch. 2016: 729 (2016) - 2015
- [e2]Stig Fr. Mjølsnes:
Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9393, Springer 2015, ISBN 978-3-319-24191-3 [contents] - [i3]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. IACR Cryptol. ePrint Arch. 2015: 1150 (2015) - 2012
- [c16]Christer Idland, Thomas Jelle, Stig Fr. Mjølsnes:
Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. ICDF2C 2012: 283-301 - [c15]Md. Abdul Based, Joe-Kai Tsay, Stig Fr. Mjølsnes:
PEVS: A Secure Electronic Voting Scheme Using Polling Booths. ICDKE 2012: 189-205 - [c14]Martin Eian, Stig Fr. Mjølsnes:
A formal analysis of IEEE 802.11w deadlock vulnerabilities. INFOCOM 2012: 918-926 - [c13]Joe-Kai Tsay, Stig Fr. Mjølsnes:
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. MMM-ACNS 2012: 65-76 - [i2]Stig Fr. Mjølsnes, Joe-Kai Tsay:
Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols. CoRR abs/1203.3866 (2012) - 2011
- [c12]Md. Abdul Based, Stig Fr. Mjølsnes:
A Secure Internet Voting Scheme. ICA3PP (2) 2011: 141-152 - [c11]Martin Eian, Stig Fr. Mjølsnes:
The modeling and comparison of wireless network denial of service attacks. MobiHeld@SOSP 2011: 7:1-7:6 - 2010
- [c10]Gurvinder Singh, Martin Eian, Svein Yngvar Willassen, Stig Fr. Mjølsnes:
Detecting Intermediary Hosts by TCP Latency Measurements. ICDF2C 2010: 38-54 - [c9]Md. Abdul Based, Stig Fr. Mjølsnes:
Universally Composable NIZK Protocol in an Internet Voting Scheme. STM 2010: 147-162
2000 – 2009
- 2009
- [c8]Mona Holsve Ofigsbø, Stig Fr. Mjølsnes, Poul E. Heegaard, Leif Nilsen:
Reducing the Cost of Certificate Revocation: A Case Study. EuroPKI 2009: 51-66 - [c7]Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes:
An Improved Attack on TKIP. NordSec 2009: 120-132 - 2008
- [j4]Suzana Andova, Cas Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic:
A framework for compositional verification of security protocols. Inf. Comput. 206(2-4): 425-459 (2008) - [e1]Stig Fr. Mjølsnes, Sjouke Mauw, Sokratis K. Katsikas:
Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings. Lecture Notes in Computer Science 5057, Springer 2008, ISBN 978-3-540-69484-7 [contents] - 2006
- [j3]Anne Marie Hegland, Eli Winjum, Stig Fr. Mjølsnes, Chunming Rong, Øivind Kure, Pål Spilling:
A survey of key management in ad hoc networks. IEEE Commun. Surv. Tutorials 8(1-4): 48-66 (2006) - [c6]Stig Fr. Mjølsnes, Marius Teigen:
A Survey on Trust and Privacy Negotiability in the Norwegian Mobile Telecom Market. STM 2006: 135-142 - [i1]Suzana Andova, Cas Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic:
A framework for compositional verification of security protocols. CoRR abs/cs/0611062 (2006) - 2003
- [j2]Stig Fr. Mjølsnes, Chunming Rong:
On-Line E-Wallet System with Decentralized Credential Keepers. Mob. Networks Appl. 8(1): 87-99 (2003) - 2002
- [j1]Stig Fr. Mjølsnes:
Book Review: Mobile Commerce (A review of Mobile Commerce: Opportunities, Applications, and Technologies). IEEE Distributed Syst. Online 3(4) (2002)
1990 – 1999
- 1997
- [c5]Stig Fr. Mjølsnes, Rolf Michelsen:
Open Transnational System for Digital Currency Payments. HICSS (5) 1997: 198-207 - 1994
- [c4]Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner:
The ESPRIT Project CAFE - High Security Digital Payment Systems. ESORICS 1994: 217-230 - 1991
- [c3]Stig Fr. Mjølsnes:
Privacy, Cryptographic Pseudonyms, and The State of Health. ASIACRYPT 1991: 493-494
1980 – 1989
- 1989
- [c2]Stig Fr. Mjølsnes:
A Simple Technique for Diffusing Cryptoperiods. EUROCRYPT 1989: 110-120 - [c1]David Chaum, Bert den Boer, Eugène van Heyst, Stig Fr. Mjølsnes, Adri Steenbeek:
Efficient Offline Electronic Checks (Extended Abstract). EUROCRYPT 1989: 294-301
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint