Mats Näslund
According to our database1,
Mats Näslund
authored at least 53 papers
between 1995 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
1
2
1
4
2
1
1
1
1
1
2
1
1
2
2
1
3
4
3
1
1
2
1
1
2
1
1
1
1
3
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
2018
Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test.
Cryptogr. Commun., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 2018 IEEE Nordic Circuits and Systems Conference, 2018
2017
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.
J. Signal Process. Syst., 2017
Proceedings of the International Conference on Selected Topics in Mobile and Wireless Networking, 2017
2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the European Conference on Networks and Communications, 2016
2015
IEEE J. Biomed. Health Informatics, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the CLOSER 2015, 2015
2014
Energy-efficient message authentication for IEEE 802.15.4-based wireless sensor networks.
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014
Proceedings of the 2014 International Symposium on System-on-Chip, 2014
Proceedings of the 19th IEEE European Test Symposium, 2014
2013
Int. J. Medical Informatics, 2013
Survey and comparison of message authentication solutions on wireless sensor networks.
Ad Hoc Networks, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
A quantitative analysis of current security concerns and solutions for cloud computing.
J. Cloud Comput., 2012
Proceedings of the IEEE International Conference on Communication Systems, 2012
2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
A Taxonomy Model for Cloud Computing Services.
Proceedings of the CLOSER 2011, 2011
2010
Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and Testbeds.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010
2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
J. Cryptol., 2008
Proceedings of the Advances in Ad Hoc Networking, 2008
The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
2007
Integrity Transform Carrying Roll-Over Counter for the Secure Real-time Transport Protocol (SRTP).
RFC, January, 2007
2006
Key Management Extensions for Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP).
RFC, July, 2006
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
2005
Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2.
RFC, November, 2005
Proceedings of the Security Protocols, 2005
2004
Proceedings of the Public Key Cryptography, 2004
2003
2002
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002
Proceedings of the LATIN 2002: Theoretical Informatics, 2002
Proceedings of the Advances in Cryptology, 2002
2001
2000
IEEE Trans. Inf. Theory, 2000
1999
Electron. Colloquium Comput. Complex., 1999
On Steiner Triple Systems and Perfect Codes.
Ars Comb., 1999
1998
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Advances in Cryptology, 1995