Bakgrunn og aktiviteter
Vitenskapelig, faglig og kunstnerisk arbeid
Et utvalg av nyere tidsskriftspublikasjoner, kunstneriske produksjoner, bok, inklusiv bokdeler og rapport-del. Se alle publikasjoner i databasen
- (2017) Key recovery: Inert and public. Lecture Notes in Computer Science. vol. 10311 LNCS.
- (2017) Bitcoin Unchained. ERCIM News. vol. 110.
- (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science. vol. 9722.
- (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security.
- (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. vol. 106.
- (2016) Security Proofs for Protocols Involving Humans. Computer journal.
- (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science. vol. 9496.
- (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science. vol. 8975.
- (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online. vol. 14 (1).
- (2015) Modelling attacks on self-authentication watermarking. Multimedia tools and applications.
- (2015) Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing. vol. 361.
- (2014) Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security. vol. 13 (2).
- (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing. vol. 2014:135.
- (2014) CHURNs: Freshness Assurance for Humans. Computer journal. vol. 58 (10).
- (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN). vol. 9 (2).
Del av bok/rapport
- (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.
- (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. Proceedings of NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
- (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings.
- (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings.
- (2015) PassCue: The Shared Cues System in Practice. Technology and Practice of Passwords.