Background and activities
I joined NTNU in 2013 as Professor in information security. I have previously been a faculty member at QUT, Australia and University of Manchester, UK.
For my publications please see my Google Scholar page.
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
- (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science. vol. 9722.
- (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security.
- (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. vol. 106.
- (2016) Security Proofs for Protocols Involving Humans. Computer journal.
- (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science. vol. 9496.
- (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science. vol. 8975.
- (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online. vol. 14 (1).
- (2015) Modelling attacks on self-authentication watermarking. Multimedia tools and applications.
- (2015) Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing. vol. 361.
- (2014) Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security. vol. 13 (2).
- (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing. vol. 2014:135.
- (2014) CHURNs: Freshness Assurance for Humans. Computer journal. vol. 58 (10).
- (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN). vol. 9 (2).
Part of book/report
- (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. Proceedings of NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
- (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings.
- (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings.
- (2015) PassCue: The Shared Cues System in Practice. Technology and Practice of Passwords.
- (2014) Continuous After-the-Fact Leakage-Resilient Key Exchange. Information Security and Privacy, 19th Australasian Conference, ACISP 2014.
- (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings.
- (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. Proceedings of the 6th International Conference on Security of Information and Networks.