The ESPRIT project CAFE—High security digital payment systems JP Boly, A Bosselaers, R Cramer, R Michelsen, S Mjølsnes, F Muller, ... Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994 | 257 | 1994 |
A survey of key management in ad hoc networks AM Hegland, E Winjum, SF Mjolsnes, C Rong, O Kure, P Spilling IEEE Communications Surveys & Tutorials 8 (3), 48-66, 2006 | 194 | 2006 |
Efficient offline electronic checks D Chaum, B den Boer, E van Heyst, S Mjølsnes, A Steenbeek Advances in Cryptology—EUROCRYPT’89: Workshop on the Theory and Application …, 1990 | 108 | 1990 |
A framework for compositional verification of security protocols S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović Information and Computation 206 (2-4), 425-459, 2008 | 105* | 2008 |
Easy 4G/LTE IMSI catchers for non-programmers SF Mjølsnes, RF Olimid Computer Network Security: 7th International Conference on Mathematical …, 2017 | 80 | 2017 |
System of secured payment by the transfer of electronic money through an interbank network SF Mjolsnes, R Michelsen, MJ Revillet, A De Solages US Patent 5,905,976, 1999 | 80 | 1999 |
On-line e-wallet system with decentralized credential keepers SF Mjølsnes, C Rong Mobile Networks and Applications 8, 87-99, 2003 | 78 | 2003 |
A vulnerability in the umts and lte authentication and key agreement protocols JK Tsay, SF Mjølsnes Computer Network Security: 6th International Conference on Mathematical …, 2012 | 73 | 2012 |
From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS C Boyd, B Hale, SF Mjølsnes, D Stebila Cryptographers’ Track at the RSA Conference, 55-71, 2016 | 47 | 2016 |
Eavesdropping near field communication H Kortvedt, S Mjolsnes The Norwegian Information Security Conference (NISK) 27, 5768, 2009 | 43 | 2009 |
A formal analysis of IEEE 802.11 w deadlock vulnerabilities M Eian, SF Mjølsnes 2012 Proceedings IEEE INFOCOM, 918-926, 2012 | 37 | 2012 |
An improved attack on TKIP FM Halvorsen, O Haugen, M Eian, SF Mjølsnes Nordic Conference on Secure IT Systems, 120-132, 2009 | 36 | 2009 |
The modeling and comparison of wireless network denial of service attacks M Eian, SF Mjølsnes Proceedings of the 3rd ACM SOSP workshop on networking, systems, and …, 2011 | 28 | 2011 |
Localized credentials for server assisted mobile wallet SF Mjolsnes, C Rong Proceedings 2001 International Conference on Computer Networks and Mobile …, 2001 | 25 | 2001 |
Digital forensic research SY Willassen, SF Mjolsnes Telektronikk 101 (1), 92, 2005 | 23 | 2005 |
E-Wallet Software Architecture and Decentralized Credentials R Hernandez, SF MJØLSNES Norsk Informatikkonferancse (NIK), 1-12, 2003 | 16 | 2003 |
Reducing the cost of certificate revocation: A case study MH Ofigsbø, SF Mjølsnes, P Heegaard, L Nilsen Public Key Infrastructures, Services and Applications: 6th European Workshop …, 2010 | 12 | 2010 |
Blue Midnight Wish D Gligoroski, V Klima, SJ Knapskog, M El-Hadedy, J Amundsen, ... proceeding of The First SHA-3 Candidate Conference, 2009 | 11 | 2009 |
A non-interactive zero knowledge proof protocol in an internet voting scheme MA Based, SF Mjølsnes Proceedings of the the 2nd Norwegian Security Conference (NISK 2009), Tapir …, 2009 | 11 | 2009 |
Experimental analysis of subscribers’ privacy exposure by lte paging C Sørseth, SX Zhou, SF Mjølsnes, RF Olimid Wireless Personal Communications 109, 675-693, 2019 | 9 | 2019 |