Sigurd Eskeland

According to our database1, Sigurd Eskeland authored at least 22 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Novel and Efficient Privacy-Preserving Continuous Authentication.
Cryptogr., March, 2024

2023
Privacy-preserving continuous authentication using behavioral biometrics.
Int. J. Inf. Sec., December, 2023

Private set intersection using RSA subgroups with constant-size encryptions.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

2022
Cryptanalysis of a privacy-preserving behavior-oriented authentication scheme.
IACR Cryptol. ePrint Arch., 2022

Collusion-resistant broadcast encryption based on hidden RSA subgroups.
IACR Cryptol. ePrint Arch., 2022

A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
Security, Privacy, and Usability in Continuous Authentication: A Survey.
Sensors, 2021

2020
Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving Greater-Than Integer Comparison without Binary Decomposition.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2018
Temporal anonymity in the AMS scenario without a TTP.
Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, 2018

2017
Communication-efficient privacy-preserving smart metering.
Proceedings of the 11th European Conference on Software Architecture, 2017

Fully threshold broadcast encryption.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Compromise-protection of smart meters in the smart grid using co-dependent authentication.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016

2010
Secure Group Communication Using Fractional Public Keys.
Proceedings of the ARES 2010, 2010

2008
Efficient Hierarchical Group-Oriented Key Establishment and Decryption.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Secure Team-Based EPR Access Acquisition in Wireless Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
EPR Access Authorization of Medical Teams Based on Patient Consent.
Proceedings of the European Conference on eHealth 2007, 2007

Hierarchical Multi-Party Key Agreement for Wireless Networks.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A Novel Decentralized Hierarchical Access Control Scheme for the Medical Scenario.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

Anonymity Preserving Authorization Granting in Medical Information Networks.
Proceedings of the European Conference on eHealth 2006, 2006

Access control by secure multi-party EPR decryption in the medical scenario.
Proceedings of the Third IASTED International Conference on Communication, 2006

Security analysis of a large-scale voting scheme.
Proceedings of the Third IASTED International Conference on Communication, 2006


  Loading...