Svein J. Knapskog
According to our database1,
Svein J. Knapskog
authored at least 50 papers
between 1980 and 2013.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on ntnu.edu
On csauthors.net:
Bibliography
2013
J. Math. Cryptol., 2013
2012
Social Trust as a solution to address sparsity-inherent problems of Recommender systems
CoRR, 2012
2011
A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices
CoRR, 2011
Internationally Standardized Efficient Cryptographic Hash Function.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform.
Proceedings of the 2011 NASA/ESA Conference on Adaptive Hardware and Systems, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010
Performance and area efficient transpose memory architecture for high throughput adaptive signal processing systems.
Proceedings of the 2010 NASA/ESA Conference on Adaptive Hardware and Systems, 2010
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for FPGA Platforms.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
A New Measure to Estimate Pseudo-Randomness of Boolean Functions and Relations with Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
IACR Cryptol. ePrint Arch., 2008
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 4th International Workshop on Security and Trust Management, 2008
Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems.
Proceedings of the 10th EUROS/UKSim International Conference on Computer Modelling and Simulation, 2008
Proceedings of the Q2SWinet'08, 2008
Proceedings of the LCN 2008, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
2007
Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions.
IACR Cryptol. ePrint Arch., 2007
DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
J. Networks, 2006
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
Cryptcoding - Encryption and Error-Correction Coding in a Single Step.
Proceedings of the 2006 International Conference on Security & Management, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005
Incorporating Attacker Behavior in Stochastic Models of Security.
Proceedings of The 2005 International Conference on Security and Management, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
1997
How to trust systems.
Proceedings of the Information Security in Research and Business, 1997
1990
Proceedings of the Advances in Cryptology, 1990
1988
Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity.
Proceedings of the Advances in Cryptology, 1988
1980
A 140 Mbits/s Digital Transmission System for Coaxial Cable Using Partial Response Class 1 Line Code with Quantized Feedback.
IEEE Trans. Commun., 1980