Svein J. Knapskog

According to our database1, Svein J. Knapskog authored at least 50 papers between 1980 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2013
On a special class of multivariate quadratic quasigroups (MQQs).
J. Math. Cryptol., 2013

2012
Social Trust as a solution to address sparsity-inherent problems of Recommender systems
CoRR, 2012

2011
A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices
CoRR, 2011

Internationally Standardized Efficient Cryptographic Hash Function.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Trust evaluation initialization using contextual information.
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011

MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme.
Proceedings of the Trusted Systems - Third International Conference, 2011

An Efficient Authorship Protection Scheme for Shared Multimedia Content.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Re-evaluating the Wisdom of Crowds in Assessing Web Security.
Proceedings of the Financial Cryptography and Data Security, 2011

Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform.
Proceedings of the 2011 NASA/ESA Conference on Adaptive Hardware and Systems, 2011

2010
The Digital Signature Scheme MQQ-SIG.
IACR Cryptol. ePrint Arch., 2010

Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform.
IACR Cryptol. ePrint Arch., 2010

Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform.
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010

Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010

Performance and area efficient transpose memory architecture for high throughput adaptive signal processing systems.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010

Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Autonomic Intrusion Detection System.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Attribute Normalization in Network Intrusion Detection.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for FPGA Platforms.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Inferring Trust Based on Similarity with TILLIT.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

A New Measure to Estimate Pseudo-Randomness of Boolean Functions and Relations with Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
The Stream Cipher Edon80.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

Public Key Block Cipher Based on Multivariate Quadratic Quasigroups.
IACR Cryptol. ePrint Arch., 2008

High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms.
IACR Cryptol. ePrint Arch., 2008

A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems.
Proceedings of the 10th EUROS/UKSim International Conference on Computer Modelling and Simulation, 2008

Trust transferability among similar contexts.
Proceedings of the Q2SWinet'08, 2008

TSR: trust-based secure MANET routing using HMMs.
Proceedings of the Q2SWinet'08, 2008

Real-time intrusion prevention and security analysis of networks using HMMs.
Proceedings of the LCN 2008, 2008

On the Importance of the Key Separation Principle for Different Modes of Operation.
Proceedings of the Information Security Practice and Experience, 2008

Cross-Situation Trust Reasoning.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

New Cryptographic Primitives.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Turbo SHA-2.
IACR Cryptol. ePrint Arch., 2007

Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions.
IACR Cryptol. ePrint Arch., 2007

DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Bypassing Data Execution Prevention on MicrosoftWindows XP SP2.
Proceedings of the The Second International Conference on Availability, 2007

2006
On Stochastic Modeling for Integrated Security and Dependability Evaluation.
J. Networks, 2006

A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

Cryptcoding - Encryption and Error-Correction Coding in a Single Step.
Proceedings of the 2006 International Conference on Security & Management, 2006

Towards a Stochastic Model for Integrated Security and Dependability Evaluation.
Proceedings of the The First International Conference on Availability, 2006

2005
Using Stochastic Game Theory to Compute the Expected Behavior of Attackers.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Incorporating Attacker Behavior in Stochastic Models of Security.
Proceedings of The 2005 International Conference on Security and Management, 2005

Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Belief-Based Risk Analysis.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

1997
How to trust systems.
Proceedings of the Information Security in Research and Business, 1997

1990
Formal Specification and Verification of Secure Communication Protocols.
Proceedings of the Advances in Cryptology, 1990

1988
Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity.
Proceedings of the Advances in Cryptology, 1988

1980
A 140 Mbits/s Digital Transmission System for Coaxial Cable Using Partial Response Class 1 Line Code with Quantized Feedback.
IEEE Trans. Commun., 1980


  Loading...