Mats Näslund

According to our database1, Mats Näslund authored at least 53 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security analysis of the Milenage-construction based on a PRF.
IACR Cryptol. ePrint Arch., 2023

2018
Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test.
Cryptogr. Commun., 2018

A Security Architecture for 5G Networks.
IEEE Access, 2018

Lightweight Message Authentication for Constrained Devices.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

On Designing PUF-Based TRNGs with Known Answer Tests.
Proceedings of the 2018 IEEE Nordic Circuits and Systems Conference, 2018

2017
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.
J. Signal Process. Syst., 2017

Subscription identifier privacy in 5G systems.
Proceedings of the International Conference on Selected Topics in Mobile and Wireless Networking, 2017

2016
Protecting IMSI and User Privacy in 5G Networks.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Error-Correcting Message Authentication for 5G.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A high assurance virtualization platform for ARMv8.
Proceedings of the European Conference on Networks and Communications, 2016

2015
SecourHealth: A Delay-Tolerant Security Framework for Mobile Health Data Collection.
IEEE J. Biomed. Health Informatics, 2015

Lightweight CRC-based Message Authentication.
IACR Cryptol. ePrint Arch., 2015

Cryptographically Secure CRC for Lightweight Message Authentication.
IACR Cryptol. ePrint Arch., 2015

Remotely Managed Logic Built-In Self-Test for Secure M2M Communications.
IACR Cryptol. ePrint Arch., 2015

CRC-Based Message Authentication for 5G Mobile Technology.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A random access procedure based on tunable puzzles.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Classifying Security Threats in Cloud Networking.
Proceedings of the CLOSER 2015, 2015

2014
Energy-efficient message authentication for IEEE 802.15.4-based wireless sensor networks.
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014

Keyed logic BIST for Trojan detection in SoC.
Proceedings of the 2014 International Symposium on System-on-Chip, 2014

Secure and efficient LBIST for feedback shift register-based cryptographic systems.
Proceedings of the 19th IEEE European Test Symposium, 2014

2013
Mobile health in emerging countries: A survey of research initiatives in Brazil.
Int. J. Medical Informatics, 2013

Survey and comparison of message authentication solutions on wireless sensor networks.
Ad Hoc Networks, 2013

A Framework for Authentication and Authorization Credentials in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
A quantitative analysis of current security concerns and solutions for cloud computing.
J. Cloud Comput., 2012

Privacy in machine-to-machine communications A state-of-the-art survey.
Proceedings of the IEEE International Conference on Communication Systems, 2012

2011
Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

A Taxonomy Model for Cloud Computing Services.
Proceedings of the CLOSER 2011, 2011

2010
Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and Testbeds.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Practical Construction and Analysis of Pseudo-Randomness Primitives.
J. Cryptol., 2008

Security for Context-Aware ad-hoc Networking Applications.
Proceedings of the Advances in Ad Hoc Networking, 2008

The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

2007
Integrity Transform Carrying Roll-Over Counter for the Secure Real-time Transport Protocol (SRTP).
RFC, January, 2007

2006
Key Management Extensions for Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP).
RFC, July, 2006

Multiple personal security domains.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2005
Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2.
RFC, November, 2005

Enhancing Privacy with Shared Pseudo Random Sequences.
Proceedings of the Security Protocols, 2005

2004
MIKEY: Multimedia Internet KEYing.
RFC, August, 2004

The Secure Real-time Transport Protocol (SRTP).
RFC, March, 2004

The security of all RSA and discrete log bits.
J. ACM, 2004

New Results on the Hardness of Diffie-Hellman Bits.
Proceedings of the Public Key Cryptography, 2004

2003
On the Bit Security of NTRUEncrypt.
Proceedings of the Public Key Cryptography, 2003

2002
Conversational IP multimedia security.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

The Hidden Number Problem in Extension Fields and Its Applications.
Proceedings of the LATIN 2002: Theoretical Informatics, 2002

Hidden Number Problem with the Trace and Bit Security of XTR and LUC.
Proceedings of the Advances in Cryptology, 2002

2001
Complexity Bounds on General Hard-Core Predicates.
J. Cryptol., 2001

2000
Extraction of optimally unbiased bits from a biased source.
IEEE Trans. Inf. Theory, 2000

1999
On Steiner Triple Systems and Perfect Codes.
Ars Comb., 1999

1998
The Security of Individual RSA Bits.
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998

1997
The Complexity of Computing Hard Core Predicates.
Proceedings of the Advances in Cryptology, 1997

1996
All Bits ax+b mod p are Hard (Extended Abstract).
Proceedings of the Advances in Cryptology, 1996

1995
Universal Hash Functions & Hard Core Bits.
Proceedings of the Advances in Cryptology, 1995


  Loading...