The ESPRIT project CAFE—High security digital payment systems JP Boly, A Bosselaers, R Cramer, R Michelsen, S Mjølsnes, F Muller, ... European Symposium on Research in Computer Security, 217-230, 1994 | 243 | 1994 |
A survey of key management in ad hoc networks AM Hegland, E Winjum, SF Mjolsnes, C Rong, O Kure, P Spilling IEEE Communications Surveys & Tutorials 8 (3), 48-66, 2006 | 177 | 2006 |
Efficient offline electronic checks D Chaum, B den Boer, E van Heyst, S Mjølsnes, A Steenbeek Workshop on the theory and application of of cryptographic techniques, 294-301, 1989 | 108 | 1989 |
A framework for compositional verification of security protocols S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović Information and Computation 206 (2-4), 425-459, 2008 | 91* | 2008 |
System of secured payment by the transfer of electronic money through an interbank network SF Mjolsnes, R Michelsen, MJ Revillet, A De Solages US Patent 5,905,976, 1999 | 77 | 1999 |
On-line e-wallet system with decentralized credential keepers SF Mjølsnes, C Rong Mobile Networks and Applications 8 (1), 87-99, 2003 | 67 | 2003 |
A vulnerability in the umts and lte authentication and key agreement protocols JK Tsay, SF Mjølsnes International Conference on Mathematical Methods, Models, and Architectures …, 2012 | 45 | 2012 |
Eavesdropping near field communication H Kortvedt, S Mjolsnes The Norwegian Information Security Conference (NISK) 27, 5768, 2009 | 34 | 2009 |
Easy 4G/LTE IMSI catchers for non-programmers SF Mjølsnes, RF Olimid International Conference on Mathematical Methods, Models, and Architectures …, 2017 | 33 | 2017 |
An improved attack on TKIP FM Halvorsen, O Haugen, M Eian, SF Mjølsnes Nordic Conference on Secure IT Systems, 120-132, 2009 | 30 | 2009 |
A formal analysis of IEEE 802.11 w deadlock vulnerabilities M Eian, SF Mjølsnes 2012 Proceedings IEEE INFOCOM, 918-926, 2012 | 26 | 2012 |
Computational security analysis of the UMTS and LTE authentication and key agreement protocols S Mjølsnes, JK Tsay | 23 | 2012 |
From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS C Boyd, B Hale, SF Mjølsnes, D Stebila Cryptographers’ Track at the RSA Conference, 55-71, 2016 | 22 | 2016 |
Localized credentials for server assisted mobile wallet SF Mjolsnes, C Rong Proceedings 2001 International Conference on Computer Networks and Mobile …, 2001 | 22 | 2001 |
The modeling and comparison of wireless network denial of service attacks M Eian, SF Mjølsnes Proceedings of the 3rd ACM SOSP workshop on networking, systems, and …, 2011 | 16 | 2011 |
E-wallet Software Architecture with Decentralized Credentials R Hernandez, SF MJØLSNES Norsk Informatikkonferancse (NIK), 1-12, 2003 | 16 | 2003 |
Digital forensic research SY Willassen, SF Mjolsnes Telektronikk 101 (1), 92, 2005 | 15 | 2005 |
A non-interactive zero knowledge proof protocol in an internet voting scheme SF Mjølsnes | 11 | 2009 |
Blue Midnight Wish D Gligoroski, V Klima, SJ Knapskog, M El-Hadedy, J Amundsen, ... proceeding of The First SHA-3 Candidate Conference, 2009 | 10 | 2009 |
Reducing the cost of certificate revocation: a case study MH Ofigsbø, SF Mjølsnes, P Heegaard, L Nilsen European Public Key Infrastructure Workshop, 51-66, 2009 | 9 | 2009 |