Publications until 2006

Publications 2006

  [1] Tan, C. H. A new signature scheme without random oracles. International Journal of Security and Networks Vol 1 , 3/4 (Dec. 2006), 237-242. [ http ]
  [2] Teo Joseph, C. M., Tan, C. H., and Ng, J. M. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 1 , 3/4 (Dec. 2006), 226-236. [http]
  [3] Wolthusen, S. D. Windows Device Interface Security. Information Security Technical Report 11 , 4 (Dec. 2006), 160-165. [http]
  [4] Teo Joseph, C. M., Tan, C. H., and Ng, J. M. Security analysis of provably secure constant round dynamic group key agreement. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences E89-A , 11 (Nov. 2006), 3348-3350. [http]
  [5] Tan, C. H. On waters'; signature scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E89-A , 10 (Oct. 2006), 2684-2685. [ http ]
  [6] Teo Joseph, C. M., and Tan, C. H. Authenticated Dynamic Group Key Agreement for Autoconfigurable Mobile Ad Hoc Networks. IEICE Trans Commun E89-B , 9 (Sept. 2006), 2480-2492. [ http ]
  [7] Tan, C. H. Analysis of improved signcryption scheme with key privacy. Inf. Process. Lett. 99 , 4 (Aug. 2006), 135-138. [ http ]
  [8] Wiehe, A., Hjelmås, E., and Wolthusen, S. D. Quantitative analysis of efficient antispam techniques. In Proceedings from the Seventh Annual IEEE SMC Information Assurance Workshop, United States Military Academy, West Point, NY, USA, June 21-23 (West Point, NY, USA, June 2006), IEEE Press, pp. 101-108.
  [9] Wolthusen, S. D. Secure visualization of GIS data. In Proceedings from the Seventh Annual IEEE SMC Information Assurance Workshop, United States Military Academy, West Point, NY, USA, June 21-23 (West Point, NY, USA, June 2006), IEEE Press, pp. 101-108. Accepted for publication.
  [10] Tan, C. H. Signature scheme in multi-user setting. IEICE Transactions on Fundamentals E89-A , 1 (May 2006), 1339-1345. [ http ]
  [11] Wolthusen, S. D. Revisionssichere protokollierung in standardbetriebssystemen. Datenschutz und Datensicherheit LVII , 5 (May 2006), 102-113.
  [12] Dahl, O. M., and Wolthusen, S. D. Modeling and execution of complex attack scenarios using interval timed colored petri nets. In Proceedings of the Fourth IEEE International Workshop on Information Assurance (IWIA 2006) (Royal Holloway, UK, Apr. 2006), IEEE Press, pp. 131-138. [http]
  [13] Wolthusen, S. D. Risikomanagement, sicherheitspolitiken und technische verfahren zur durchsetzung von sicherheitspolitiken (ii). IT-Sicherheit & Datenschutz , 4 (Apr. 2006), 349-352.
  [14] Cole, J. L., and Wolthusen, S. D., Eds. Proceedings of the Fourth IEEE International Workshop on Information Assurance (IWIA 2006) (Royal Holloway, UK, Apr. 2006), IEEE Press.
  [15] Wolthusen, S. D. Risikomanagement, sicherheitspolitiken und technische verfahren zur durchsetzung von sicherheitspolitiken (i). IT-Sicherheit & Datenschutz , 4 (Mar. 2006), 319-321.
  [16] Dyrkolbotn, G. O., and Snekkenes, E. A wireless covert channel on smart cards. In Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings (2006), Lecture Notes in Computer Science, Springer, pp. 249-259. [ http ]
  [17] Gafurov, D., Helkala, K., and Søndrol, T. Gait recognition using acceleration from MEMS. In Proceedings of The First International Conference on Availability, Reliability and Security (ARES 2006) (2006), pp. 432-439. [http]
  [18] Gafurov, D., Snekkenes, E., and Buvarp, T. E. Robustness of biometric gait authentication against impersonation attack. In OTM Workshops (1) (2006), Lecture Notes in Computer Science, Springer, pp. 479-488. [ http ]
  [19] Gafurov, D., Helkala, K., and Søndrol, T. Biometric gait authentication using accelerometer sensor. Journal of Computers 1 , 7 (2006). [ html ]
  [20] Gonzalez, J. J., Sarriegi, J. M., and Gurrutxaga, A. A framework for conceptualizing social engineering attacks. In Critical Information Infrastructures Security, First International Workshop (2006), Lecture Notes in Computer Science, Springer, pp. 79-90. [ http ]
  [21] Hjelmås, E., and Wolthusen, S. D. Full-Spectrum Information Security Education: Integrating B.Sc., M.Sc., and Ph.D. Programs. In Proceedings of the Third Annual Conference on Information Security Curriculum Development (ACM InfoSecCD) (Kennesaw, GA, USA, 2006), ACM Press, pp. 9-16. [http]
  [22] Kosmerlj, M., Fladsrud, T., Hjelmås, E., and Snekkenes, E. Face recognition issues in a border control environment. In Proceedings of Advances in Biometrics, International Conference, ICB 2006, Hong Kong, China, January 5-7 (2006), D. Zhang and A. K. Jain, Eds., vol. 3832 of Lecture Notes in Computer Science , Springer, pp. 33-39. [http]
  [23] Langweg, H. Malware attacks on electronic signatures revisited. In Proceedings of 'Sicherheit 2006': Jahrestagung Fachbereich Sicherheit der Gesellschaft für Informatik, Magdeburg, Germany, February 20-22 (2006), J. Dittmann, Ed., Lecture Notes in Informatics, Gesellschaft für Informatik, pp. 244-255.
  [24] Langweg, H. Framework for malware resistance metrics. In QoP '06: Proceedings of the 2nd ACM workshop on Quality of protection (New York, NY, USA, 2006), ACM Press, pp. 39-44. [ http ]
  [25] Øverlier, L., and Syverson, P. Locating hidden servers. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), Berkeley/Oakland, California, USA, May 21-24 (2006), IEEE Computer Society, pp. 100-114. [http]
  [26] Øverlier, L., and Syverson, P. Valet services: Improving hidden servers with a personal touch. In Proceedings of The 6th Workshop on Privacy Enhancing Technologies, Cambridge, UK, June 28-30 (2006).
  [27] Petrović, S., Álvarez, G., Orfila, A., and Carbó, J. Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques. In Proceedings of the 39th Hawaii International Conference on System Sciences, Kauai, Hawaii, U.S.A. (Jan. 2006), IEEE Computer Society Press. [http]
  [28] Petrović, S., and Milosavljević, M. A comparison between the silhouette index and the davies-bouldin index in labelling ids clusters. In Proceedings of the 11th Nordic Workshop on Secure IT-systems, NORDSEC 2006 (2006), pp. pp. 53-64.
  [29] Petrović, S., Álvarez, G., Orfila, A., and Carbó, J. Labelling ids clusters by means of the silhouette index. In Proceedings of the the IX Spanish Conference on Cryptography and Information Security (2006), pp. 760-772.
  [30] Tan, C. H. A secure signature scheme. In Symposium of Computer and Network Security, part of International Wireless Communications and Mobile Computing Conference 2006 (IWCMC 2006) (2006), The ACM Press. [ http ]
  [31] Tan, C. H., and Teo Joseph, C. M. Energy-efficient id-based group key agreement protocols for wireless networks. In The International Workshop on Security in Systems and Networks (SSN2006), in conjunction with the 20th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2006) (2006). [ http ]
  [32] Tan, C. H. Security analysis of signcryption scheme from q -diffie-hellman problems. IEICE Transactions on Fundamentals E89-A , 1 (Jan. 2006), 206-208. [ http ]
  [33] Tan, C. H. Chosen ciphertext security from identity-based encryption without strong condition. In Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006 (2006), Lecture Notes in Computer Science, Springer, pp. 292-307. [ http ]
  [34] Tan, C. H. Public-key encryption from id-based encryption without one-time signature. In OTM Workshops (1) (2006), Lecture Notes in Computer Science, Springer, pp. 450-459. [ http ]
  [35] Teo Joseph, C. M., Tan, C. H., and Ng, J. M. Low-power group key agreement for heterogeneous wireless networks. In Symposium of Computer and Network Security, part of International Wireless Communications and Mobile Computing Conference 2006 (IWCMC 2006) (2006), The ACM Press. [http]
  [36] Wolthusen, S. D. Sichere geo-webdienste. Business Geomatics 1 , 2 (2006), 35.
[37] Audestad, J. A. , Gaivoronski, A.A. and Werner, A. S. Extending the
stochastic programming framework for the modeling of several decision makers, Annals of Operations Research , Vol 142, No 1, 2006

Publications 2005

[1] Graf, F., and Wolthusen, S. D. A capability-based transparent cryptographic file system. In Proceedings of CYBERWORLDS 2005 (Singapore, Nov. 2005), IEEE Press, pp. 101-108. [http]
[2] Hämmerli, B. M., and Wolthusen, S. D., Eds. Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005) (Darmstadt, Germany, Nov. 2005), IEEE Press.
[3] Wolthusen, S. D. GIS-based command and control infrastructure for critical infrastructure protection. In Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005) (Darmstadt, Germany, Nov. 2005), IEEE Press, pp. 40-47. [http]
[4] Hämmerli, B. M., and Wolthusen, S. D., Eds. Proceedings of CIP Europe: Critical Infrastructure Protection (Bonn, Germany, Sept. 2005), Gesellschaft für Informatik.
[5] Wolthusen, S. D. Information sharing and decision support for C(I)IP. In Proceedings of CIP Europe: Critical Infrastructure Protection (Bonn, Germany, Sept. 2005), Gesellschaft für Informatik, pp. 7-12.
[6] Audestad, J. A. The unwired society: flexible and robust but dangerously vulnerable. In The proceedings of the third workshop on applications of wireless communications (Lappeenranta, 2005).
[7] Hasle, H., Kristiansen, Y., Kintel, K., and Snekkenes, E. Measuring resistance to social engineering. In Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14 (2005), vol. 3439 of Lecture Notes in Computer Science , Springer, pp. 132-143. [http]
[8] Øverlier, L., Brekne, T., and Årnes, A. Non-expanding transaction specific pseudonymization for IP traffic monitoring. In 4th International Conference on Cryptology and Network Security (CANS 2005), Xiamen, China, December 14-16 (2005), pp. 261-273.
[9] Snekkenes, E. Preface to the special issue on ESORICS 2003. International Journal of Information Security 4 , 3 (2005), 133-134. [http]
[10] Teo Joseph, C. M., and Tan, C. H. Energy efficient and scalable group key agreement for large ad hoc network. In The 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN 2005) (2005), pp. 114-121. [http]

Publications 2004

[1] Langweg, H., and Snekkenes, E. A classification of malicious software attacks. In Proceedings of 23rd IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, April 15-17 (2004), IEEE Computer Society, pp. 827-832.
[2] Langweg, H. Building a trusted path for applications using COTS components. In Proceedings of NATO RTO IST Panel Symposium on Adaptive Defence in Unclassified Networks, Toulouse, France, April 19-20 (2004), pp. 21-1-21-14.
[3] Langweg, H. If you stretch it too far, it breaks - challenges of biased technology. In Risks and Challenges of the Network Society: Proceedings of the Second IFIP 9.2, 9.6/11.7 Summer School, Karlstad, Sweden, August 4-8, 2003 (2004), P. Duquenoy, S. Fischer-Hübner, J. Holvast, and A. Zuccato, Eds., vol. 2004:35 of Karlstad University Studies , pp. 236-241.

Publications 2003

[1] Snekkenes, E., and Gollmann, D., Eds. Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15 (2003), vol. 2808 of Lecture Notes in Computer Science , Springer.