Publications 2007

[1] Jan Arild Audestad. Technologies and Systems for Access and Transport Networks . Artech House, 2007.
[2] Jan Arild Audestad. Internet as a multiple graph structure: The role of the transport layer. Information Security Technical Report , 12(1):16-23, 2007.
[ http ]
[3] Katrin Franke and S.N. Srihari. Computational forensics: Towards hybrid-intelligent crime investigation. In Proceedings of the third International Symposium on Information Assurance and Security / Workshop on Computational Forensics (Manchester, UK) , pages 383 - 386, 2007.
[ http ]
[4] Katrin Franke and M. van den Heuvel. Computational forensics: Techniques, applications and challenges in the computed-based analysis of questioned documents. In Tutorial handout of the 9th International Conference on Document Analysis and Recognition (ICDAR), (Curitiba, State of Parana, Brazil) , 2007. Invited spaeker.
[5] Katrin Franke. Capturing reliable data for computer-based forensic handwriting analysis. In Prodeecings of the IEEE Three-Rivers Workshop on Soft Computing in Industrial Applications . IEEE, 2007.
[6] Katrin Franke. Dynamic, online signature analysis: Trends and challenges for forensic investigation services. In Proceedings of 7th International Congress of the Gesellschaft fr Forensischen Schriftenuntersuchung (GFS) , 2007. Invited speaker.
[7] Davrondzhon Gafurov, Einar Snekkenes, and Patrick Bours. Gait authentication and identification using wearable accelerometer sensor. In Proceedings of the IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2007) , 2007.
[8] Davrondzhon Gafurov, Einar Snekkenes, and Patrick Bours. Spoof attacks on gait authentication system. IEEE Transactions on Information Forensics and Security, Special Issue on Human Detection and Recognition , Vol. 2, Issue 3, Part 2, 2007.
[9] Davrondzhon Gafurov. A survey of biometric gait recognition: Approaches, security and challenges. In Proceedings of Annual Norwegian Computer Science Conference , 2007.
[10] Davrondzhon Gafurov. Security analysis of impostor attempts with respect to gender in gait biometrics. In Proceedings of IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) , pages 1-6. IEEE, 2007.
[ http ]
[11] Janne Merete Hagen, Tormod Kalberg Sivertsen, and Chungming Rong. Information security threats and access control practices in norwegian businesses. In AINAW '07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops , pages 470-476, Washington, DC, USA, 2007. IEEE Computer Society.
[ http ]
[12] Geir Hallingstad and Lasse Øverlier. Traffic flow confidentiality in a future network enabled capability environment. In Proceedings of the 8th Annual IEEE SMC Information Assurance Workshop (IAW 2007) , 2007.
[13] Kirsi Helkala. Authentication in norwegian health services. In Proceedings of the International Symposium on Health Informatics and Bioinformatics, Turkey '07 , 2007.
[14] M. Koeppen and Katrin Franke. A generalized approach of color morphology by means of pareto-set theory. In In Proceedings Gjøvik Color Imagin Symposium, Gjøvik , Norway , 2007. Invited speaker.
[15] M. Koeppen and Katrin Franke. Pareto-dominated hypervolume measure: An alternative approach to color morphology. In Proceedings of the 7th International Conference on Hybrid Intelligent Systems (Kaiserslautern, Germany) , pages 234 - 239, 2007.
[ http ]
[16] Tarjei K. Mandt and Chik How Tan. Certificateless authenticated two-party key. In 11th Annunal Asian Computing Science Conference (ASIAN '06) , volume 4xxx of Lecture Note in Computer Science . Springer Verlag, 2007.
[17] Lasse Øverlier and Paul Syverson. Improving efficiency and simplicity of tor circuit establishment and hidden services. In Proceedings of the 7th Workshop on Privacy Enhancing Technologies , 2007.
[18] Slobodan Petrović and Katrin Franke. Improving the efficiency of digital forensic search by means of the constrained edit distance. In Proceedings of the Third International Symposium on Information Assurance and Security , pages 405-410, 2007.
[19] Slobodan Petrović. Clock control sequence reconstruction in the generalized shrinking generator. In Proceedings of SECRYPT 2007 - International Conference on Security and Cryptography , pages 259-262, 2007.
[20] Slobodan Petrović and Amparo Fuster-Sabater. Reconstruction of suboptimal paths in the constrained edit distance array with application in cryptanalysis. In Proceedings of the 2007 International Conference on Computational Science and Its Applications (ICCSA 2007) , Lecture Notes in Computer Science, pages 597-610, 2007.
[ http ]
[21] Slobodan Petrović and Katrin Franke. 'a new two-stage search procedure for misuse detection. In Proceedings of the 2007 International Conference on Future Generation Communication and Networking (FGCN 2007) , volume 1, pages 418-422, 2007.
[22] Jaziar Radianti and Jose J. Gonzalez. A preliminary model of the vulnerability black market. In System Dynamics Society , pages 138c-138c, 2007.
[23] Jaziar Radianti, Eliot Rich, and Jose J. Gonzalez. Using a mixed data collection strategy to uncover vulnerability black markets. In Second Pre-ICIS Workshop on Information Security and Privacy , 2007. Invited speacker.
[24] Steffen Reidt and Stephen D. Wolthusen. Efficient distribution of trust authority functions in tactical networks. In Proceedings from the Eighth Annual IEEE SMC Information Assurance Workshop, United States Military Academy , pages 84-91. IEEE, 2007.
[ http ]
[25] Steffen Reidt and Stephen D. Wolthusen. An evaluation of cluster head ta distribution mechanisms in tactical manet environments. In Proceedings of the First Annual Conference of ITA , 2007.
[26] Steffen Reidt and Stephen D. Wolthusen. Efficient trust authority distribution in tactical manet environments. In Proceedings of the IEEE Military Communications Conference 2007 (MILCOM 2007) . IEEE, 2007.
[27] Eliot Rich, Finn Olav Sveen, Ying Qian, Stefanie A. Hillen, Jaziar Radianti, and Jose J. Gonzalez. Emergent vulnerability in integrated operations: A proactive simulation study of risk and organizational learning. In Proceedings of the Annual Hawaii International Conference on System Sciences , pages 145a-145a. IEEE, 2007.
[ http ]
[28] Vidar Evenrud Seeberg and Slobodan Petrović. A new classification scheme for anonymization of real data used in ids benchmarking. In ARES '07: Proceedings of the The Second International Conference on Availability, Reliability and Security , pages 385-390, Vienna, Austria, 2007. IEEE Computer Society.
[ http ]
[29] Øyvind Stang and Einar Snekkenes. Experimental security evaluation of correlation based gait authentication. Technical report, Reykjavik University, Iceland, 2007.
[30] Finn Olav Sveen, Jose M. Sarriegi, Eliot Rich, and Jose J. Gonzalez. Toward viable information security reporting systems. In Proceedings International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007) , 2007.
[31] Finn Olav Sveen, Jose M. Sarriegi, and Jose J. Gonzalez. Incident learning: From safety to security. In System Dynamics Society , pages 156c-156c, 2007.
[32] Nils K. Svendsen and Stephen D. Wolthusen. Multigraph dependency models for heterogeneous critical infrastructures. In Proceedings of the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection , pages 337-350. Springer-Verlag, 2007.
[ http ]
[33] Nils K. Svendsen and Stephen D. Wolthusen. Connectivity models of interdependency in mixed-type critical infrastructure networks. Information Security Technical Report , 12(1):44-55, 2007.
[ http ]
[34] Nils K. Svendsen and Stephen D. Wolthusen. Analysis and statistical properties of critical infrastructure interdependency multiflow models. In Proceedings of the 8th Annual IEEE SMC Information Assurance Workshop 2007 (West Point, NY, USA), Jun. 2007 , pages 247-254. IEEE, 2007.
[ http ]
[35] Nils K. Svendsen and Stephen D. Wolthusen. Graph models of critical infrastructure interdependencies. In Proceedings of Autonomous Infrastructure, Manangement and Security 2007 (Oslo, Norway) , volume 4543 of Lecture Notes in Computer Science , pages 208-211. Springer-Verlag, 2007.
[ http ]
[36] Nils K. Svendsen and Stephen D. Wolthusen. A framework for modelling logical, physical, and geographic dependencies between critical infrastructures. In Proceedings of the Lund Energy Security Conference , 2007.
[37] Nils K. Svendsen and Stephen D. Wolthusen. An analysis of cyclical interdependencies in critical infrastructures. In Proceedings of the 2nd International Workshop on Critical Information Infrastructure Security . Springer-Verlag, 2007. (to appear).
[38] Nils K. Svendsen and Stephen D. Wolthusen. A framework for 3d geospatial buffering of events of interest in critical infrastructures. In Proceedings of the 2nd International Workshop on Critical Information Infrastructure Security . Springer-Verlag, 2007. (to appear).
[39] Chik How Tan and C. M. Teo Joseph. Protection against web-based password phishing. In Third International Conference on Information Technology: Next Generations (ITNG 2007) , pages 754-759. The IEEE Computer Society Press, 2007.
[ http ]
[40] Chik How Tan. Insider-secure hybrid signcryption scheme without random oracles. In Proceedings of the 1st International Workshop on Advances in Information Security, part of International Conference on Availability, Reliability and Security 2007 (ARES 2007) , pages 1148-1154. The IEEE Computer Press, 2007.
[ http ]
[41] Chik How Tan, Joseph Chee Ming Teo, and Jens-Are Amundsen. Authenticated broadcast encryption scheme. In AINAW '07: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops , pages 512-518, Washington, DC, USA, 2007. IEEE Computer Society.
[ http ]
[42] Chik How Tan. Forgery of provable secure short signcryption scheme. IEICE Trans. on Fundamentals , E90-A(9):1879-1880, September 2007.
[43] Chik How Tan. Security analysis of joint group key agreement protocol. IEICE Trans. on Fundamentals , E90-A(9):1876-1878, September 2007.
[44] Joseph Chee Ming Teo and Chik How Tan. Denial-of-service resilience password-based group key agreement for wireless networks. In Proceedings of the 3rd ACM International Workshop on QoS and Security for Wireless and Mobile Networks , pages 136-143. ACM, 2007.
[ http ]
[45] C. M. Teo Joseph, Chik How Tan, and J. M. Ng. Authenticated group key agreement against dos in heterogeneous wireless networks. In IEEE Wireless Communications and Networking Conference 2007 , pages 3563-3568, 2007.
[ http ]
[46] Stephen D. Wolthusen. The role of mathematics in information security education. In Proceedings 5th IFIP TC11.8 World Conference on Information Security Education, WISE5 , volume 237, pages 129-136. Springer-Verlag, 2007.
[ http ]
[47] Stephen D. Wolthusen. Automated Extraction of Behavioral Profiles from Document Usage. BT Technology Journal , 25(1):192-200, January 2007.
[48] Stephen D. Wolthusen. Vertrauenswürdige protokollierung mittels nicht-deterministischer nebenläufiger wechselseitiger überwachung. IT-Sicherheit & Datenschutz , (10):740-743, October 2007.
[49] Meng-Da Wu and Stephen D. Wolthusen. Network forensics of ssl/tls encrypted channels. In Proceedings of the 6th European Conference on Information Warfare and Security , pages 303-312, 2007.
[50] G.O. Dyrkolbotn. Analysis of the wireless covert channel attack: Carrier frequency selection). In Norsk Informatikkonferanse, Norsk informatikkonferanse 2007, pages 153–163.