Stig Frode Mjølsnes
Bakgrunn og aktiviteter
Emner
- TM8107 - Kryptoprotokoller og anvendelser
- TTM4905 - Kommunikasjonsteknologi, masteroppgave
- TTM4502 - Kommunikasjonsteknologi, fordypningsprosjekt
Vitenskapelig, faglig og kunstnerisk arbeid
Et utvalg av nyere tidsskriftspublikasjoner, kunstneriske produksjoner, bok, inklusiv bokdeler og rapport-del. Se alle publikasjoner i databasen
Tidsskriftspublikasjoner
- (2019) Private Identification of Subscribers in Mobile Networks: Status and Challenges. IEEE Communications Magazine. vol. 57 (9).
- (2019) Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging. Wireless personal communications. vol. 109.
- (2018) Distributed Personal Password Repository using Secret Sharing. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 11 (1).
- (2018) User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 2017: NISK2017.
- (2018) Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging. arXiv.org.
- (2017) Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. Lecture Notes in Computer Science (LNCS). vol. 10311.
- (2017) Easy 4G/LTE IMSI Catchers for Non-Programmers. Lecture Notes in Computer Science (LNCS). vol. 10446 LNCS.
- (2017) Introducing Mobile Network Security Experiments to Communication Technology Education. IFIP Advances in Information and Communication Technology. vol. 503.
- (2017) The Challenge of Private Identification. IFIP International Federation for Information Processing. vol. TC 11 (eCollection-1).
- (2017) On low-cost privacy exposure attacks in LTE mobile communication. Proceedings of the Romanian Academy. Series A Mathematics, Physics, Technical Sciences, Information Science. vol. 18 (Special issue 2017).
- (2013) Security Analysis of the Terrestrial Trunked Radio (TETRA) Authentication Protocol. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 2 (1).
- (2013) Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. vol. 114.
- (2012) A Formal Analysis of IEEE 802.11w Deadlock Vulnerabilities. IEEE Infocom. Proceedings.
- (2012) A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. Lecture Notes in Computer Science (LNCS). vol. 7531.
- (2011) A Secure Internet Voting Scheme. Lecture Notes in Computer Science (LNCS). vol. 7017.
- (2011) Universally Composable NIZK Protocol in an Internet Voting Scheme. Lecture Notes in Computer Science (LNCS). vol. 6710.
- (2011) Detecting Intermediary Hosts by TCP Latency Measurements. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. vol. 53.
- (2010) Multiparty Ballot Counting in an Internet Voting Scheme. Acta Electrotechnica et Informatica. vol. 10 (4).
- (2010) Reducing the Cost of Certificate Revocation: A Case Study. Lecture Notes in Computer Science (LNCS). vol. 6391.
- (2008) A framework for compositional verification of security protocols. Information and Computation. vol. 206 (2-4).