


default search action
Svein J. Knapskog
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j3]Yanling Chen, Danilo Gligoroski, Svein J. Knapskog:
On a special class of multivariate quadratic quasigroups (MQQs). J. Math. Cryptol. 7(2): 111-141 (2013) - [i11]Mohamed El-Hadedy, Georgios Pitsilis, Svein J. Knapskog:
An Efficient Authorship Protection Scheme for Shared Multimedia Content. CoRR abs/1309.7640 (2013) - 2012
- [i10]Georgios Pitsilis, Svein J. Knapskog:
Social Trust as a solution to address sparsity-inherent problems of Recommender systems. CoRR abs/1208.1004 (2012) - 2011
- [c38]Mohamed El-Hadedy, Danilo Gligoroski, Svein Johan Knapskog:
Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform. AHS 2011: 240-247 - [c37]Pern Hui Chia, Svein Johan Knapskog:
Re-evaluating the Wisdom of Crowds in Assessing Web Security. Financial Cryptography 2011: 299-314 - [c36]Mohamed El-Hadedy, Georgios Pitsilis, Svein J. Knapskog:
An Efficient Authorship Protection Scheme for Shared Multimedia Content. ICIG 2011: 914-919 - [c35]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. INTRUST 2011: 184-203 - [c34]Mozhgan Tavakolifard, Svein J. Knapskog:
Trust evaluation initialization using contextual information. MEDES 2011: 1-8 - [c33]Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen:
Internationally Standardized Efficient Cryptographic Hash Function. SECRYPT 2011: 426-433 - [i9]Ayu Tiwari, Sudip Sanyal, Ajith Abraham, Svein Johan Knapskog, Sugata Sanyal:
A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices. CoRR abs/1111.3010 (2011) - 2010
- [c32]Mohamed El-Hadedy, Martin Margala
, Danilo Gligoroski, Svein J. Knapskog:
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. IAS 2010: 44-47 - [c31]Mohamed El-Hadedy, Sohan Purohit, Martin Margala
, Svein J. Knapskog:
Performance and area efficient transpose memory architecture for high throughput adaptive signal processing systems. AHS 2010: 113-120 - [c30]Benedikt Westermann, Danilo Gligoroski, Svein J. Knapskog:
Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates. ICT Innovations 2010: 102-113 - [c29]Mohamed El-Hadedy, Martin Margala
, Danilo Gligoroski, Svein J. Knapskog:
Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform. ReConFig 2010: 394-399 - [e2]Finn Arve Aagesen, Svein J. Knapskog:
Networked Services and Applications - Engineering, Control and Management, 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings. Lecture Notes in Computer Science 6164, Springer 2010, ISBN 978-3-642-13970-3 [contents] - [i8]Danilo Gligoroski, Svein Johan Knapskog, Smile Markovski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère:
The Digital Signature Scheme MQQ-SIG. CoRR abs/1010.3163 (2010) - [i7]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
The Digital Signature Scheme MQQ-SIG. IACR Cryptol. ePrint Arch. 2010: 527 (2010) - [i6]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform. IACR Cryptol. ePrint Arch. 2010: 571 (2010)
2000 – 2009
- 2009
- [c28]Mozhgan Tavakolifard, Peter Herrmann
, Svein J. Knapskog:
Inferring Trust Based on Similarity with TILLIT. IFIPTM 2009: 133-148 - [c27]Marie Elisabeth Gaup Moe
, Bjarne E. Helvik
, Svein J. Knapskog:
Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments. IFIPTM 2009: 283-297 - [c26]Bendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog:
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. IIH-MSP 2009: 1066-1071 - [c25]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for FPGA Platforms. INCoS 2009: 100-104 - [c24]Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog:
Attribute Normalization in Network Intrusion Detection. ISPAN 2009: 448-453 - [c23]Wei Wang, Thomas Guyet
, Svein J. Knapskog:
Autonomic Intrusion Detection System. RAID 2009: 359-361 - [p2]Danilo Gligoroski, Smile Markovski, Svein Johan Knapskog:
A New Measure to Estimate Pseudo-Randomness of Boolean Functions and Relations with Gröbner Bases. Gröbner Bases, Coding, and Cryptography 2009: 421-425 - [e1]Audun Jøsang, Torleiv Maseng, Svein J. Knapskog:
Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings. Lecture Notes in Computer Science 5838, Springer 2009, ISBN 978-3-642-04765-7 [contents] - 2008
- [c22]Kjetil Haslum, Ajith Abraham, Svein J. Knapskog:
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment. Asia International Conference on Modelling and Simulation 2008: 631-636 - [c21]Svein J. Knapskog:
New Cryptographic Primitives. CISIM 2008: 3-7 - [c20]Mozhgan Tavakolifard, Svein J. Knapskog, Peter Herrmann
:
Cross-Situation Trust Reasoning. Web Intelligence/IAT Workshops 2008: 67-71 - [c19]Danilo Gligoroski, Suzana Andova, Svein J. Knapskog:
On the Importance of the Key Separation Principle for Different Modes of Operation. ISPEC 2008: 404-418 - [c18]Kjetil Haslum, Marie Elisabeth Gaup Moe
, Svein J. Knapskog:
Real-time intrusion prevention and security analysis of networks using HMMs. LCN 2008: 927-934 - [c17]Marie Elisabeth Gaup Moe
, Bjarne E. Helvik
, Svein J. Knapskog:
TSR: trust-based secure MANET routing using HMMs. Q2SWinet 2008: 83-90 - [c16]Mozhgan Tavakolifard, Svein J. Knapskog, Peter Herrmann
:
Trust transferability among similar contexts. Q2SWinet 2008: 91-97 - [c15]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. ReConFig 2008: 427-432 - [c14]Kjetil Haslum, Ajith Abraham, Svein Johan Knapskog:
Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems. UKSim 2008: 216-223 - [c13]Mozhgan Tavakolifard, Svein J. Knapskog:
A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments. STM@IFIPTM 2008: 139-149 - [p1]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
The Stream Cipher Edon80. The eSTREAM Finalists 2008: 152-169 - [i5]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. CoRR abs/0808.0247 (2008) - [i4]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. IACR Cryptol. ePrint Arch. 2008: 320 (2008) - [i3]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. IACR Cryptol. ePrint Arch. 2008: 339 (2008) - 2007
- [c12]Nenad Stojanovski, Marjan Gusev
, Danilo Gligoroski, Svein J. Knapskog:
Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. ARES 2007: 1222-1226 - [c11]Kjetil Haslum, Ajith Abraham, Svein J. Knapskog:
DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment. IAS 2007: 183-190 - [i2]Danilo Gligoroski, Svein Johan Knapskog:
Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions. IACR Cryptol. ePrint Arch. 2007: 154 (2007) - [i1]Danilo Gligoroski, Svein Johan Knapskog:
Turbo SHA-2. IACR Cryptol. ePrint Arch. 2007: 403 (2007) - 2006
- [j2]Karin Sallhammar, Bjarne E. Helvik
, Svein J. Knapskog:
On Stochastic Modeling for Integrated Security and Dependability Evaluation. J. Networks 1(5): 31-42 (2006) - [c10]Karin Sallhammar, Bjarne E. Helvik
, Svein J. Knapskog:
Towards a Stochastic Model for Integrated Security and Dependability Evaluation. ARES 2006: 156-165 - [c9]Danilo Gligoroski, Svein J. Knapskog, Suzana Andova:
Cryptcoding - Encryption and Error-Correction Coding in a Single Step. Security and Management 2006: 145-151 - [c8]Karin Sallhammar, Bjarne E. Helvik
, Svein J. Knapskog:
A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. DASC 2006: 61-68 - 2005
- [c7]André Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe
, Svein J. Knapskog:
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems. CIS (2) 2005: 388-397 - [c6]Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog:
Incorporating Attacker Behavior in Stochastic Models of Security. Security and Management 2005: 79-85 - [c5]Karin Sallhammar, Svein J. Knapskog, Bjarne E. Helvik:
Using Stochastic Game Theory to Compute the Expected Behavior of Attackers. SAINT Workshops 2005: 102-105 - 2004
- [c4]Audun Jøsang, Daniel Bradley, Svein J. Knapskog:
Belief-Based Risk Analysis. ACSW 2004: 63-68
1990 – 1999
- 1997
- [c3]Audun Jøsang, F. Van Laenen, Svein J. Knapskog, Joos Vandewalle:
How to trust systems. SEC 1997: 241-252 - 1990
- [c2]Svein J. Knapskog:
Formal Specification and Verification of Secure Communication Protocols. AUSCRYPT 1990: 58-73
1980 – 1989
- 1988
- [c1]Svein J. Knapskog:
Privacy Protected Payments - Realization of a Protocol that Guarantees Payer Anonymity. EUROCRYPT 1988: 107-122 - 1980
- [j1]Terje Røste, Nils Holte, Svein J. Knapskog:
A 140 Mbits/s Digital Transmission System for Coaxial Cable Using Partial Response Class 1 Line Code with Quantized Feedback. IEEE Trans. Commun. 28(8): 1425-1430 (1980)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint