Geir M. Køien

Orcid: 0000-0002-7363-0076

Affiliations:
  • System Security Group, Faculty of Engineering and Science, University of Agder, Grimstad, Norway


According to our database1, Geir M. Køien authored at least 33 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Road to a Trustworthy 6G; On the Need for a "Zero Trust 6G" Paradigm.
J. Mobile Multimedia, 2024

2021
Zero-Trust Principles for Legacy Components.
Wirel. Pers. Commun., 2021

On Threats to the 5G Service Based Architecture.
Wirel. Pers. Commun., 2021

A Threat Analysis of Human Bond Communications.
Wirel. Pers. Commun., 2021

Initial Reflections on the Use of Augmented Cognition in Derailing the Kill Chain.
Proceedings of the Augmented Cognition, 2021

2020
A Philosophy of Security Architecture Design.
Wirel. Pers. Commun., 2020

2019
Why Cryptosystems Fail Revisited.
Wirel. Pers. Commun., 2019

2018
Trust management in tactical coalition software defined networks.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

Towards Risk-aware Access Control Framework for Healthcare Information Sharing.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Sharing With Care - Multidisciplinary Teams and Secure Access to Electronic Health Records.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

2017
Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification.
J. Heal. Informatics Res., 2017

2016
A privacy enhanced device access protocol for an IoT context.
Secur. Commun. Networks, 2016

Access Control Model for Cooperative Healthcare Environments: Modeling and Verification.
Proceedings of the 2016 IEEE International Conference on Healthcare Informatics, 2016

Towards an Access Control Model for Collaborative Healthcare Systems.
Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016), 2016

2015
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks.
J. Cyber Secur. Mobil., 2015

2014
A "Best Current Practice" for 3GPP-based cellular system security.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Security and privacy in the Internet of Things: Current status and open issues.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

2013
Privacy enhanced mutual authentication in LTE.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Privacy handling for critical information infrastructures.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

Addressing the Terms-of-Service Threat - Client-side Security and Policy Control for Free File Storage Services.
Proceedings of the CLOSER 2013, 2013

GPRS Security for Smart Meters.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

2012
Mobility and Spatio-Temporal Exposure Control Exposure Control as a Primary Security and Privacy Tool Regarding Mobility, Roaming Privacy and Home Control.
J. Cyber Secur. Mobil., 2012

2011
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context.
Wirel. Pers. Commun., 2011

Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context.
Wirel. Pers. Commun., 2011

Privacy Enhanced Device Access.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Mutual entity authentication for LTE.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2007
Privacy Enhanced Mobile Authentication.
Wirel. Pers. Commun., 2007

2005
Privacy enhanced cellular access security.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Location Privacy for Cellular Systems; Analysis and Solution.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

2004
Access security in CDMA2000, including a comparison with UMTS access security.
IEEE Wirel. Commun., 2004

An introduction to access security in UMTS.
IEEE Wirel. Commun., 2004

2003
Security aspects of 3G-WLAN interworking.
IEEE Commun. Mag., 2003

Spatio-temporal exposure control.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...