S. F. Mjølsnes
S. F. Mjølsnes
Professor at NTNU
Verified email at
Cited by
Cited by
The ESPRIT project CAFE—High security digital payment systems
JP Boly, A Bosselaers, R Cramer, R Michelsen, S Mjølsnes, F Muller, ...
Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994
A survey of key management in ad hoc networks
AM Hegland, E Winjum, SF Mjolsnes, C Rong, O Kure, P Spilling
IEEE Communications Surveys & Tutorials 8 (3), 48-66, 2006
Efficient offline electronic checks
D Chaum, B den Boer, E van Heyst, S Mjølsnes, A Steenbeek
Advances in Cryptology—EUROCRYPT’89: Workshop on the Theory and Application …, 1990
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
Easy 4G/LTE IMSI catchers for non-programmers
SF Mjølsnes, RF Olimid
Computer Network Security: 7th International Conference on Mathematical …, 2017
On-line e-wallet system with decentralized credential keepers
SF Mjølsnes, C Rong
Mobile Networks and Applications 8, 87-99, 2003
System of secured payment by the transfer of electronic money through an interbank network
SF Mjolsnes, R Michelsen, MJ Revillet, A De Solages
US Patent 5,905,976, 1999
A vulnerability in the umts and lte authentication and key agreement protocols
JK Tsay, SF Mjølsnes
Computer Network Security: 6th International Conference on Mathematical …, 2012
From stateless to stateful: Generic authentication and authenticated encryption constructions with application to TLS
C Boyd, B Hale, SF Mjølsnes, D Stebila
Cryptographers’ Track at the RSA Conference, 55-71, 2016
Eavesdropping near field communication
H Kortvedt, S Mjolsnes
The Norwegian Information Security Conference (NISK) 27, 5768, 2009
An improved attack on TKIP
FM Halvorsen, O Haugen, M Eian, SF Mjølsnes
Nordic Conference on Secure IT Systems, 120-132, 2009
A formal analysis of IEEE 802.11 w deadlock vulnerabilities
M Eian, SF Mjølsnes
2012 Proceedings IEEE INFOCOM, 918-926, 2012
The modeling and comparison of wireless network denial of service attacks
M Eian, SF Mjølsnes
Proceedings of the 3rd ACM SOSP workshop on networking, systems, and …, 2011
Localized credentials for server assisted mobile wallet
SF Mjolsnes, C Rong
Proceedings 2001 International Conference on Computer Networks and Mobile …, 2001
Digital forensic research
SY Willassen, SF Mjolsnes
Telektronikk 101 (1), 92, 2005
E-Wallet Software Architecture and Decentralized Credentials
R Hernandez, SF MJØLSNES
Norsk Informatikkonferancse (NIK), 1-12, 2003
Reducing the cost of certificate revocation: A case study
MH Ofigsbø, SF Mjølsnes, P Heegaard, L Nilsen
Public Key Infrastructures, Services and Applications: 6th European Workshop …, 2010
A non-interactive zero knowledge proof protocol in an internet voting scheme
MA Based, SF Mjølsnes
Proceedings of the the 2nd Norwegian Security Conference (NISK 2009), Tapir …, 2009
Blue midnight wish
D Gligoroski, V Klima, SJ Knapskog, M El-Hadedy, J Amundsen, ...
proceeding of The First SHA-3 Candidate Conference, 2009
Experimental analysis of subscribers’ privacy exposure by lte paging
C Sørseth, SX Zhou, SF Mjølsnes, RF Olimid
Wireless Personal Communications 109, 675-693, 2019
The system can't perform the operation now. Try again later.
Articles 1–20