Navigation

  • Skip to Content
NTNU Home

ntnu.edu

  • Studies
    • Master's programmes in English
    • For exchange students
    • PhD opportunities
    • All programmes of study
    • Courses
    • Financing
    • Language requirements
    • Application process
    • Academic calendar
    • FAQ
  • Research and innovation
    • NTNU research
    • Research excellence
    • Strategic research areas
    • Innovation resources
    • PhD opportunities
  • Life and housing
    • Student in Trondheim
    • Student in Gjøvik
    • Student in Ålesund
    • For researchers
    • Life and housing
  • About NTNU
    • Contact us
    • Faculties and departments
    • Libraries
    • International researcher support
    • Vacancies
    • About NTNU
    • Maps
  1. Home
  2. Employees

Språkvelger

Norsk

Stig Frode Mjølsnes

Stig Frode Mjølsnes

Professor
Department of Information Security and Communication Technology

stig.mjolsnes@item.ntnu.no
+4773550459 +4741305114 Elektro B, B219, Gløshaugen, O. S. Bragstads plass 2
Publications Teaching Media

Publications

  • Chronological
  • By category
  • See all publications in Cristin

2021

  • Mjølsnes, Stig Frode; Costache, Anamaria. (2021) The NISK 2021 Proceedings Message from the Programme Chairs. NIKT: Norsk IKT-konferanse for forskning og utdanning.
    Article

2019

  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2019) Private Identification of Subscribers in Mobile Networks: Status and Challenges. IEEE Communications Magazine. volum 57 (9).
    Academic article
  • Sørseth, Christian; Zhou, Shelley Xianyu; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2019) Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging. Wireless Personal Communications. volum 109.
    Academic article

2018

  • Elle, Merete Løland; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2018) Distributed Personal Password Repository using Secret Sharing. Norsk Informasjonssikkerhetskonferanse (NISK). volum 11 (1).
    Academic article
  • Mjølsnes, Stig Frode; Amundsen, Vilde Elise. (2018) Høringssvar ang. forslag til endringer i valgforskriften. 2018.
    Report
  • Mjølsnes, Stig Frode; Soleng, Ragnar. (2018) The NISK 2018 Proceedings: Message from the Programme Chairs. Norsk Informasjonssikkerhetskonferanse (NISK). volum 11 (1).
    Article
  • Rikardsen, Charlotte S.; Hale, Britta; Mjølsnes, Stig Frode. (2018) User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps. Norsk Informasjonssikkerhetskonferanse (NISK). volum 2017: NISK2017.
    Academic article
  • Sørseth, Christian; Zhou, Xianyu Shelley; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2018) Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging. arXiv.org.
    Academic article

2017

  • Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. Lecture Notes in Computer Science (LNCS). volum 10311.
    Academic article
  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Experimental Assessment of Private Information Disclosure in LTE Mobile Networks. Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - (Volume 6).
    Academic chapter/article
  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Easy 4G/LTE IMSI Catchers for Non-Programmers. Lecture Notes in Computer Science (LNCS). volum 10446 LNCS.
    Academic article
  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Introducing Mobile Network Security Experiments to Communication Technology Education. IFIP Advances in Information and Communication Technology. volum 503.
    Academic article
  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) The Challenge of Private Identification. IFIP International Federation for Information Processing. volum TC 11 (eCollection-1).
    Academic article
  • Olimid, Ruxandra-Florentina; Mjølsnes, Stig Frode. (2017) On low-cost privacy exposure attacks in LTE mobile communication. Proceedings of the Romanian Academy. Series A Mathematics, Physics, Technical Sciences, Information Science. volum 18 (Special issue 2017).
    Academic article

2016

  • Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings.
    Academic chapter/article
  • Stajano, Frank; Mjølsnes, Stig Frode; Jenkinson, Graeme; Thorsheim, Per. (2016) Preface. Lecture Notes in Computer Science (LNCS). volum 9551.
    Editorial
  • Stajano, Frank; Mjølsnes, Stig Frode; Jenkinson, Graeme; Thorsheim, Per. (2016) Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7--9, 2015, Proceedings. Springer. 2016. ISBN 978-3-319-29937-2. Lecture Notes in Computer Science (9551).
    Scientific anthology
  • Stig, Øyvann; Mjølsnes, Stig Frode. (2016) Det nye nettet. ComputerWorld Norge. volum 34 (23).
    publications.INTERVJUSKRIFTL

2015

  • Mjølsnes, Stig Frode. (2015) Preface. Technology and Practice of Passwords.
    Foreword
  • Mjølsnes, Stig Frode. (2015) Technology and Practice of Passwords. Springer Publishing Company. 2015. ISBN 978-3-319-24191-3. Lecture Notes in Computer Science (9393).
    Scientific anthology
  • Mjølsnes, Stig Frode. (2015) Technology and Practice of Passwords. Springer Publishing Company. 2015. ISBN 978-3-319-24192-0. Lecture Notes in Computer Science (9393).
    Scientific anthology

2013

  • Bezem, Bram; Fjellby, Per Kristian J.; Birkeland, Roger; Mjølsnes, Stig Frode. (2013) Authenticated uplink for the small, low-orbit student satellite NUTS. Proceedings of the 2nd IAA Conference on University Satellite Missions & Cubesat Workshop.
    Academic chapter/article
  • Duan, Shuwen; Mjølsnes, Stig Frode; Tsay, Joe-Kai. (2013) Security Analysis of the Terrestrial Trunked Radio (TETRA) Authentication Protocol. Norsk Informasjonssikkerhetskonferanse (NISK). volum 2 (1).
    Academic article
  • Idland, Christer; Jelle, Thomas; Mjølsnes, Stig Frode. (2013) Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. volum 114.
    Academic article

2012

  • Eian, Martin; Mjølsnes, Stig Frode. (2012) A Formal Analysis of IEEE 802.11w Deadlock Vulnerabilities. IEEE Infocom. Proceedings.
    Academic article
  • Tsay, Joe-Kai; Mjølsnes, Stig Frode. (2012) A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. Lecture Notes in Computer Science (LNCS). volum 7531.
    Academic article

2011

  • Based, Md Abdul; Mjølsnes, Stig Frode. (2011) A Secure Internet Voting Scheme. Lecture Notes in Computer Science (LNCS). volum 7017.
    Academic article
  • Based, Md Abdul; Mjølsnes, Stig Frode. (2011) Universally Composable NIZK Protocol in an Internet Voting Scheme. Lecture Notes in Computer Science (LNCS). volum 6710.
    Academic article
  • Eian, Martin; Mjølsnes, Stig Frode. (2011) The modeling and comparison of wireless network denial of service attacks. MobiHeld '11: Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2011) A Multidisciplinary Introduction to Information Security. CRC Press. 2011. ISBN 978-1-4200-8590-7.
    Scientific anthology
  • Mjølsnes, Stig Frode. (2011) Cryptographic Protocols. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2011) Introduction. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2011) Preface. A Multidisciplinary Introduction to Information Security.
    Foreword
  • Mjølsnes, Stig Frode. (2011) Public Key Distribution. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Mjølsnes, Stig Frode; Eian, Martin. (2011) Wireless Network Access. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Mjølsnes, Stig Frode; Willassen, Svein Yngvar. (2011) ICT and Forensic Science. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Singh, Gurvinder; Eian, Martin; Willassen, Svein Yngvar; Mjølsnes, Stig Frode. (2011) Detecting Intermediary Hosts by TCP Latency Measurements. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. volum 53.
    Academic article

2010

  • Based, Md Abdul; Mjølsnes, Stig Frode; Stenbek, Marius Brekke. (2010) Multiparty Ballot Counting in an Internet Voting Scheme. Acta Electrotechnica et Informatica. volum 10 (4).
    Academic article
  • Ofigsbø, Mona Holsve; Mjølsnes, Stig Frode; Heegaard, Poul Einar; Nilsen, Leif. (2010) Reducing the Cost of Certificate Revocation: A Case Study. Lecture Notes in Computer Science (LNCS). volum 6391.
    Academic article
  • Singh, Gurvinder; Eian, Martin; Willassen, Svein Yngvar; Mjølsnes, Stig Frode. (2010) Detecting Intermediary Hosts by TCP Latency Measurements. 2nd International ICST Conference on Digital Forensics & Cyber Crime.
    Academic chapter/article

2009

  • Based, Md Abdul; Mjølsnes, Stig Frode. (2009) A Non-Interactive Zero Knowledge Proof Protocol in an Internet Voting Scheme. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Academic chapter/article
  • Based, Md Abdul; Reistad, Tord Ingolf; Mjølsnes, Stig Frode. (2009) Internet Voting using Multiparty Computations. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Academic chapter/article
  • Kortvedt, Henning Siitonen; Mjølsnes, Stig Frode. (2009) Eavesdropping near field communication. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Academic chapter/article
  • Mauland, Atle; Reistad, Tord Ingolf; Mjølsnes, Stig Frode. (2009) Realizing Distributed RSA Key Generation Using VIFF. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2009) Høringsuttalelse: NOU 2009:1, Individ og integritet.
    Web pages (information material)
  • Mjølsnes, Stig Frode. (2009) Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009. Tapir Akademisk Forlag. 2009. ISBN 978-82-519-2492-4.
    Scientific anthology
  • Mjølsnes, Stig Frode. (2009) Preface. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Foreword

2008

  • Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2008) A framework for compositional verification of security protocols. Information and Computation. volum 206 (2-4).
    Academic article
  • Mjølsnes, Stig Frode; Mauw, Sjouke; Katsikas, Sokratis. (2008) Public Key Infrastructure. Springer. 2008. ISBN 978-3-540-69484-7. Lecture Notes in Computer Science (5057).
    Scientific anthology

2006

  • Mjølsnes, Stig Frode; Teigen, Marius. (2006) A Survey on Trust and Privacy Negotiability in the Norwegian Mobile Telecom Market. Electronical Notes in Theoretical Computer Science.
    Academic article
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål. (2006) Evaluation of Key Management in ad hoc Networks for Emergency and Rescue operations. IEEE Communications Surveys & Tutorials.
    Academic chapter/article
  • Hegland, Anne Marie; Winjum, Eli; Mjølsnes, Stig Frode; Rong, Chunming; Kure, Øivind; Spilling, Pål. (2006) Survey of Key Management in Ad Hoc Networks. IEEE Communications Surveys and Tutorials. volum 8 (3).
    Academic article
  • Mjølsnes, Stig Frode; Hafskjold, Christine. (2006) Sikkerhet og tillit. Offentlige tjenester på internett.
    Academic chapter/article

2005

  • Mjølsnes, Stig Frode; Sallhammar, Karin. (2005) Teaching Information Security by Software Laboratory Didactics. Proceedings IADAT-e2005.
    Academic chapter/article
  • Mjølsnes, Stig Frode; Sallhammar, Karin. (2005) Web security laboratory didactics. IADAT Journal of Advanced Technology. volum 2 (2).
    Academic article
  • Willassen, Svein Yngvar; Mjølsnes, Stig Frode. (2005) Digital forensics research. Telektronikk. volum 1.
    Academic article
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål. (2005) Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations. Norsk informatikkonferanse NIK'2005.
    Academic chapter/article

2004

  • Mjølsnes, Stig Frode. (2004) NTNU er opptatt av websikkerhet. ComputerWorld Norge.
    Letter to the editor

2003

  • Mjølsnes, Stig Frode; Rong, Chunming. (2003) On-line E-Wallet System with Decentralized Credential Keeper. ?. volum 8 (1).
    Academic article

1994

  • Mjølsnes, Stig Frode; Knapskog, Svein J.. (1994) Sikkerhetsevaluering av delt EDB-system for Bodø kommune. 1994. SINTEF DELAB rapport (STF40 F).
    Report

Scientific articles

  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2019) Private Identification of Subscribers in Mobile Networks: Status and Challenges. IEEE Communications Magazine. volum 57 (9).
    Academic article
  • Sørseth, Christian; Zhou, Shelley Xianyu; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2019) Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging. Wireless Personal Communications. volum 109.
    Academic article
  • Elle, Merete Løland; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2018) Distributed Personal Password Repository using Secret Sharing. Norsk Informasjonssikkerhetskonferanse (NISK). volum 11 (1).
    Academic article
  • Rikardsen, Charlotte S.; Hale, Britta; Mjølsnes, Stig Frode. (2018) User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps. Norsk Informasjonssikkerhetskonferanse (NISK). volum 2017: NISK2017.
    Academic article
  • Sørseth, Christian; Zhou, Xianyu Shelley; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2018) Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging. arXiv.org.
    Academic article
  • Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. Lecture Notes in Computer Science (LNCS). volum 10311.
    Academic article
  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Easy 4G/LTE IMSI Catchers for Non-Programmers. Lecture Notes in Computer Science (LNCS). volum 10446 LNCS.
    Academic article
  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Introducing Mobile Network Security Experiments to Communication Technology Education. IFIP Advances in Information and Communication Technology. volum 503.
    Academic article
  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) The Challenge of Private Identification. IFIP International Federation for Information Processing. volum TC 11 (eCollection-1).
    Academic article
  • Olimid, Ruxandra-Florentina; Mjølsnes, Stig Frode. (2017) On low-cost privacy exposure attacks in LTE mobile communication. Proceedings of the Romanian Academy. Series A Mathematics, Physics, Technical Sciences, Information Science. volum 18 (Special issue 2017).
    Academic article
  • Duan, Shuwen; Mjølsnes, Stig Frode; Tsay, Joe-Kai. (2013) Security Analysis of the Terrestrial Trunked Radio (TETRA) Authentication Protocol. Norsk Informasjonssikkerhetskonferanse (NISK). volum 2 (1).
    Academic article
  • Idland, Christer; Jelle, Thomas; Mjølsnes, Stig Frode. (2013) Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. volum 114.
    Academic article
  • Eian, Martin; Mjølsnes, Stig Frode. (2012) A Formal Analysis of IEEE 802.11w Deadlock Vulnerabilities. IEEE Infocom. Proceedings.
    Academic article
  • Tsay, Joe-Kai; Mjølsnes, Stig Frode. (2012) A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. Lecture Notes in Computer Science (LNCS). volum 7531.
    Academic article
  • Based, Md Abdul; Mjølsnes, Stig Frode. (2011) A Secure Internet Voting Scheme. Lecture Notes in Computer Science (LNCS). volum 7017.
    Academic article
  • Based, Md Abdul; Mjølsnes, Stig Frode. (2011) Universally Composable NIZK Protocol in an Internet Voting Scheme. Lecture Notes in Computer Science (LNCS). volum 6710.
    Academic article
  • Singh, Gurvinder; Eian, Martin; Willassen, Svein Yngvar; Mjølsnes, Stig Frode. (2011) Detecting Intermediary Hosts by TCP Latency Measurements. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. volum 53.
    Academic article
  • Based, Md Abdul; Mjølsnes, Stig Frode; Stenbek, Marius Brekke. (2010) Multiparty Ballot Counting in an Internet Voting Scheme. Acta Electrotechnica et Informatica. volum 10 (4).
    Academic article
  • Ofigsbø, Mona Holsve; Mjølsnes, Stig Frode; Heegaard, Poul Einar; Nilsen, Leif. (2010) Reducing the Cost of Certificate Revocation: A Case Study. Lecture Notes in Computer Science (LNCS). volum 6391.
    Academic article
  • Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2008) A framework for compositional verification of security protocols. Information and Computation. volum 206 (2-4).
    Academic article
  • Mjølsnes, Stig Frode; Teigen, Marius. (2006) A Survey on Trust and Privacy Negotiability in the Norwegian Mobile Telecom Market. Electronical Notes in Theoretical Computer Science.
    Academic article
  • Hegland, Anne Marie; Winjum, Eli; Mjølsnes, Stig Frode; Rong, Chunming; Kure, Øivind; Spilling, Pål. (2006) Survey of Key Management in Ad Hoc Networks. IEEE Communications Surveys and Tutorials. volum 8 (3).
    Academic article
  • Mjølsnes, Stig Frode; Sallhammar, Karin. (2005) Web security laboratory didactics. IADAT Journal of Advanced Technology. volum 2 (2).
    Academic article
  • Willassen, Svein Yngvar; Mjølsnes, Stig Frode. (2005) Digital forensics research. Telektronikk. volum 1.
    Academic article
  • Mjølsnes, Stig Frode; Rong, Chunming. (2003) On-line E-Wallet System with Decentralized Credential Keeper. ?. volum 8 (1).
    Academic article

Journal publications

  • Mjølsnes, Stig Frode; Costache, Anamaria. (2021) The NISK 2021 Proceedings Message from the Programme Chairs. NIKT: Norsk IKT-konferanse for forskning og utdanning.
    Article
  • Mjølsnes, Stig Frode; Soleng, Ragnar. (2018) The NISK 2018 Proceedings: Message from the Programme Chairs. Norsk Informasjonssikkerhetskonferanse (NISK). volum 11 (1).
    Article
  • Stajano, Frank; Mjølsnes, Stig Frode; Jenkinson, Graeme; Thorsheim, Per. (2016) Preface. Lecture Notes in Computer Science (LNCS). volum 9551.
    Editorial
  • Stig, Øyvann; Mjølsnes, Stig Frode. (2016) Det nye nettet. ComputerWorld Norge. volum 34 (23).
    publications.INTERVJUSKRIFTL
  • Mjølsnes, Stig Frode. (2004) NTNU er opptatt av websikkerhet. ComputerWorld Norge.
    Letter to the editor

Books

  • Stajano, Frank; Mjølsnes, Stig Frode; Jenkinson, Graeme; Thorsheim, Per. (2016) Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7--9, 2015, Proceedings. Springer. 2016. ISBN 978-3-319-29937-2. Lecture Notes in Computer Science (9551).
    Scientific anthology
  • Mjølsnes, Stig Frode. (2015) Technology and Practice of Passwords. Springer Publishing Company. 2015. ISBN 978-3-319-24191-3. Lecture Notes in Computer Science (9393).
    Scientific anthology
  • Mjølsnes, Stig Frode. (2015) Technology and Practice of Passwords. Springer Publishing Company. 2015. ISBN 978-3-319-24192-0. Lecture Notes in Computer Science (9393).
    Scientific anthology
  • Mjølsnes, Stig Frode. (2011) A Multidisciplinary Introduction to Information Security. CRC Press. 2011. ISBN 978-1-4200-8590-7.
    Scientific anthology
  • Mjølsnes, Stig Frode. (2009) Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009. Tapir Akademisk Forlag. 2009. ISBN 978-82-519-2492-4.
    Scientific anthology
  • Mjølsnes, Stig Frode; Mauw, Sjouke; Katsikas, Sokratis. (2008) Public Key Infrastructure. Springer. 2008. ISBN 978-3-540-69484-7. Lecture Notes in Computer Science (5057).
    Scientific anthology

Part of book/report

  • Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Experimental Assessment of Private Information Disclosure in LTE Mobile Networks. Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - (Volume 6).
    Academic chapter/article
  • Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2015) Preface. Technology and Practice of Passwords.
    Foreword
  • Bezem, Bram; Fjellby, Per Kristian J.; Birkeland, Roger; Mjølsnes, Stig Frode. (2013) Authenticated uplink for the small, low-orbit student satellite NUTS. Proceedings of the 2nd IAA Conference on University Satellite Missions & Cubesat Workshop.
    Academic chapter/article
  • Eian, Martin; Mjølsnes, Stig Frode. (2011) The modeling and comparison of wireless network denial of service attacks. MobiHeld '11: Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2011) Cryptographic Protocols. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2011) Introduction. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2011) Preface. A Multidisciplinary Introduction to Information Security.
    Foreword
  • Mjølsnes, Stig Frode. (2011) Public Key Distribution. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Mjølsnes, Stig Frode; Eian, Martin. (2011) Wireless Network Access. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Mjølsnes, Stig Frode; Willassen, Svein Yngvar. (2011) ICT and Forensic Science. A Multidisciplinary Introduction to Information Security.
    Academic chapter/article
  • Singh, Gurvinder; Eian, Martin; Willassen, Svein Yngvar; Mjølsnes, Stig Frode. (2010) Detecting Intermediary Hosts by TCP Latency Measurements. 2nd International ICST Conference on Digital Forensics & Cyber Crime.
    Academic chapter/article
  • Based, Md Abdul; Mjølsnes, Stig Frode. (2009) A Non-Interactive Zero Knowledge Proof Protocol in an Internet Voting Scheme. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Academic chapter/article
  • Based, Md Abdul; Reistad, Tord Ingolf; Mjølsnes, Stig Frode. (2009) Internet Voting using Multiparty Computations. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Academic chapter/article
  • Kortvedt, Henning Siitonen; Mjølsnes, Stig Frode. (2009) Eavesdropping near field communication. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Academic chapter/article
  • Mauland, Atle; Reistad, Tord Ingolf; Mjølsnes, Stig Frode. (2009) Realizing Distributed RSA Key Generation Using VIFF. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Academic chapter/article
  • Mjølsnes, Stig Frode. (2009) Preface. Norsk informasjonssikkerhetskonferanse : NISK 2:2009 : NTNU, Trondheim 24.-25. november 2009.
    Foreword
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål. (2006) Evaluation of Key Management in ad hoc Networks for Emergency and Rescue operations. IEEE Communications Surveys & Tutorials.
    Academic chapter/article
  • Mjølsnes, Stig Frode; Hafskjold, Christine. (2006) Sikkerhet og tillit. Offentlige tjenester på internett.
    Academic chapter/article
  • Mjølsnes, Stig Frode; Sallhammar, Karin. (2005) Teaching Information Security by Software Laboratory Didactics. Proceedings IADAT-e2005.
    Academic chapter/article
  • Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål. (2005) Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations. Norsk informatikkonferanse NIK'2005.
    Academic chapter/article

Report

  • Mjølsnes, Stig Frode; Amundsen, Vilde Elise. (2018) Høringssvar ang. forslag til endringer i valgforskriften. 2018.
    Report
  • Mjølsnes, Stig Frode; Knapskog, Svein J.. (1994) Sikkerhetsevaluering av delt EDB-system for Bodø kommune. 1994. SINTEF DELAB rapport (STF40 F).
    Report

Teaching

Courses

  • TM8107 - Cryptographic Protocols and Their Applications
  • TTM4502 - Communication Technology, Specialization Project
  • TTM4905 - Communication Technology, Master's Thesis

Media

2019

  • Interview
    Eidem, Magnus; Mjølsnes, Stig Frode. (2019) Ingen kan garantere kundene 100 prosent sikkerhet -- Dagens Næringsliv. https://www.dn.no/telekom/sikkerhet/mobilnett/huawei/cisco-t [Internett]. 2019-02-14.

2018

  • Academic lecture
    Løland Elle, Merete; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2018) Distributed Personal Password Repository using Secret Sharing. NISK 2018 . NIKT 2018; Longyearbyen, Svalbard. 2018-09-19 - 2018-09-20.
  • Lecture
    Mjølsnes, Stig Frode. (2018) Information Security Teaching and Research at NTNU---Welcome to NTNU. Common Criteria User Forum Workshop . Common Criteria User Forum; Trondheim. 2018-04-24 - 2018-04-26.
  • Lecture
    Olimid, Ruxandra-Florentina; Mjølsnes, Stig Frode. (2018) The problem of private identification. Crypto Action Symposium 2018 . COST'1306; Sutomore. 2018-04-04 - 2018-04-05.
  • Lecture
    Olimid, Ruxandra-Florentina; Mjølsnes, Stig Frode. (2018) The problem of private identification protocols. Real World Crypto Symposium 2018 . International Association for Cryptologic Research (IACR); Zurich. 2018-01-10 - 2018-01-12.

2017

  • Academic lecture
    Mjølsnes, Stig Frode. (2017) Identification and Privacy in Mobile Communications---IMSI Catchers and Mobile Privacy Protocols. Romanian Cryptology Days RCD-2017 . Romanian Academy; Bucuresti. 2017-09-18 - 2017-09-20.
  • Academic lecture
    Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Easy 4G/LTE IMSI Catchers for Non-Programmers. 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017 . Gdansk University of Technology; Warszawa. 2017-08-28 - 2017-08-30.
  • Poster
    Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Experimental Assessment of Private Information Disclosure in LTE Mobile Networks. Secrypt 2017 ; Madrid. 2017-07-24 - 2017-07-26.
  • Academic lecture
    Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) Introducing a Mobile Network Security Lab to ICT Education. IFIP WG 11.8 World Conference, WISE 10 . IFIP; Rome. 2017-05-29 - 2017-05-31.
  • Lecture
    Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2017) The Challenge of Private Identification. IFIP WG 11.4 Workshop - iNetSec 2017 ; Rome. 2017-05-31 - 2017-05-31.
  • Academic lecture
    Rikardsen, Charlotte S.; Hale, Britta; Mjølsnes, Stig Frode. (2017) User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps. Norsk Informasjonssikkerhetskonferanse NISK 2017 (samlokalisert med NIKT 2017) . Norsk IKT konferanse for forskning og utdanning; Westerdals, Oslo. 2017-11-27 - 2017-11-29.

2016

  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS. TU-Darmstadt Invited Talk . Marc Fischlin; Darmstadt, Germany. 2016-04-21 - 2016-04-21.
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016 ; San Francisco, USA. 2016-02-29 - 2016-03-04.
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS. COINS Finse Winter School 2016 . Tor Helleseth, Britta Hale, Hanno Langweg; Finse, Norway. 2016-04-24 - 2016-04-29.
  • Academic lecture
    Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. (2016) Attacks on cMix - Some Small Overlooked Details. Mycrypt 2016 ; 2016-12-01 - 2016-12-02.
  • Lecture
    Mjølsnes, Stig Frode. (2016) Crypto Research and Mass Surveillance. Spring Ph.D. Milestone Seminar Computer Science and Information Security . NTNU i Gjøvik; Trondheim. 2016-03-17 - 2016-03-18.
  • Lecture
    Mjølsnes, Stig Frode. (2016) Kommunikasjonsikkerhet, kryptografi og masseovervåking. Nordisk Råd seminar . NTNU og Nordisk Råd; Rådsalen, NTNU. 2016-08-03 - 2016-08-03.
  • Academic lecture
    Mjølsnes, Stig Frode. (2016) Mobile Phones, Crypto, and Mass Surveillance. Crypto vs Mass Surveillance: The Uneasy Relationship . NTNU; Trondheim. 2016-11-14 - 2016-11-14.
  • Academic lecture
    Mjølsnes, Stig Frode. (2016) Mobile Privacy and IMSI Catchers. Norwegian - Slovakian Workshop on Crypto . Universitetet i Bergen; Høyteknologisenteret, Bergen. 2016-02-08 - 2016-02-10.
  • Lecture
    Mjølsnes, Stig Frode. (2016) Mobile aksessnett, falske basestasjoner og Oslo IMSI-fangere. SINTEF Lerkendal . SINTEF KOMSYS; Trondheim. 2016-05-02 - 2016-05-02.

2015

  • Academic lecture
    Mjølsnes, Stig Frode. (2015) Mobile Security and the Oslo IMSI-Catchers. FRISC Reykjavik Conference on Information Security . FRISC/NTNU/Reykjavik University; Reykjavik. 2015-06-08 - 2015-06-09.
  • Lecture
    Mjølsnes, Stig Frode. (2015) Mobil-overvåkning og Oslo IMSI-fangere. IDI/ITEM Symposium 2015 . NTNU; Trondheim. 2015-10-09 - 2015-10-09.
  • Academic lecture
    Mjølsnes, Stig Frode. (2015) Reproducing Acoustic Side-Channel Crypto Attacks. Norwegian Crypto Seminar . FRISC/NTNU; Trondheim. 2015-09-08 - 2015-09-08.
  • Interview
    Mjølsnes, Stig Frode; Johansen, Per Anders; Foss, Andreas Bakke. (2015) Bygget spionutstyr på universitetet - NTNU studenten valgte en noe uvanlig masteroppgave ..side 10 og 11. Aftenposten [Avis]. 2015-07-02.
  • Interview
    Mjølsnes, Stig Frode; Johansen, Per Anders; Foss, Andreas Bakke. (2015) Ekspertene om mobildataene -Forskere, professorer og uavhengige eksperter har vurdert datamaterialet og den nye rapporten om mobilovervåking ..side 12. Aftenposten [Avis]. 2015-06-24.
  • Interview
    Mjølsnes, Stig Frode; Johansen, Per Anders; Foss, Andreas Bakke; Thoresen, Fredrik. (2015) New report: Clear signs of mobile surveillance in Oslo, despite denial from Police Security Service. Aftenposten.no [Internett]. 2015-06-24.
  • Interview
    Mjølsnes, Stig Frode; Johansen, Per Anders; Foss, Andreas Bakke; Thoresen, Fredrik. (2015) Spionsporene PST ikke snakket om. ..sidene 8, 9, 10 og 11. Aftenposten [Avis]. 2015-06-24.

2014

  • Interview
    Bjøru, Stein; Mjølsnes, Stig Frode. (2014) Sikkerheten skjerpes. Adresseavisen [Avis]. 2014-12-17.
  • Interview
    Flæten, Sigurd Øygarden; Mjølsnes, Stig Frode. (2014) NFC APPLE PAY. Mobilbetaling kan ikke bli like sikkert som chip og PIN. Teknisk Ukeblad TU [Internett]. 2014-09-12.
  • Interview
    Færaas, Arild; Mjølsnes, Stig Frode. (2014) Ber om tips på en totalt usikker løsning --- Den hemmelige tjenesten PST vil gjerne ha tips fra publikum på e-post. Aftenposten, side 8 [Avis]. 2014-11-22.
  • Interview
    Færaas, Arild; Mjølsnes, Stig Frode. (2014) PST ber om tips fra publikum - på en totalt usikker løsning. Aftenposten [Internett]. 2014-11-21.
  • Interview
    Matre Aasarød, Askild; Mjølsnes, Stig Frode. (2014) Kryptiske samtaler. Magasinet Plot [Tidsskrift]. 2014-12-05.
  • Lecture
    Mjølsnes, Stig Frode. (2014) Mobil betaling. FRISC Frokostmøte . NTNU; Rica Nidelven, Trondheim. 2014-04-04 - 2014-04-04.
  • Popular scientific lecture
    Mjølsnes, Stig Frode. (2014) Personvern og overvåking i dagens samfunn. Medlemsmøte Sør-Trøndelag Unge Venstre . Sør-Trøndelag Unge Venstre; Trondheim. 2014-03-13 - 2014-03-13.
  • Lecture
    Mjølsnes, Stig Frode. (2014) Presentation of the FRISC National Research Network. FRISC Forum on Information Security in the Norwegian Oil and Gas Industry . UiS/NTNU; Ipark, Stavanger. 2014-08-29 - 2014-08-29.
  • Interview
    Mjølsnes, Stig Frode; MOLBERG, BÅRD OVE. (2014) NTNU-professor Stig Frode Mjølsnes forklarer hvordan hackere kan utnytte sikkerhetstabben «Heartbleed». Adresseavisen adressa.no [Internett]. 2014-04-11.
  • Interview
    Mjølsnes, Stig Frode; Ruud, Merethe. (2014) 5 spørsmål om mobilovervåking. Tekniske Ukeblad Nr.0514 [Fagblad]. 2014-04-13.
  • Interview
    Mjølsnes, Stig Frode; Sved, Børge. (2014) Vil lære studentene å bygge overvåkningsutstyr. Universitetsavisa.no [Internett]. 2014-12-16.

2013

  • Academic lecture
    Bezem, Bram; Fjellby, Per Kristian J.; Birkeland, Roger; Mjølsnes, Stig Frode. (2013) Authenticated uplink for the small, low-orbit student satellite NUTS. 2nd IAA Conference on University Satellites Missions & Cubesat Workshop . Gaussteam og International Academy of Astronautics; Roma. 2013-02-03 - 2013-02-09.
  • Academic lecture
    Duan, Shuwen; Mjølsnes, Stig Frode; Tsay, Joe-Kai. (2013) Security Analysis of the Terrestrial Trunked Radio Authentication Protocol. Norsk Informasjonssikkerhetskonferanse . FRISC; Stavanger. 2013-11-19 - 2013-11-20.
  • Interview
    Hasselknippe, Peder; Mjølsnes, Stig Frode. (2013) Krig i det femte element. Under Dusken [Avis]. 2013-04-23.
  • Interview
    Vikan, Jonas Alsaker; Mjølsnes, Stig Frode. (2013) Her tester han 22 000 passord i sekundet...men det er altfor sakte til å knekke komplisert kryptering. http://www.adressa.no/nyheter/trondheim/article7037557.ece [Internett]. 2013-02-07.
  • Interview
    Vikan, Jonas Alsaker; Mjølsnes, Stig Frode. (2013) «Prosjektet prøver å løse et problem norske politietterforskere har snublet over». http://www.adressa.no/nyheter/trondheim/article7038237.ece [Internett]. 2013-02-07.

2012

  • Academic lecture
    Eian, Martin; Mjølsnes, Stig Frode. (2012) A Formal Analysis of IEEE 802.11w Deadlock Vulnerabilities. The 31st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2012) . IEEE; Orlando, FL. 2012-03-25 - 2012-03-30.
  • Academic lecture
    Mjølsnes, Stig Frode. (2012) A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols. 25th IEEE Computer Security Foundation Symposium . Harvard University; Harvard University, Cambridge, MA. 2012-06-25 - 2012-06-27.
  • Academic lecture
    Mjølsnes, Stig Frode. (2012) Denial-of-service Attacks on Wireless Access Protocols. Second International Workshop on Scientific Analysis and Policy Support for Cyber Security . St.Petersburg Institute for Informatics and Automation; St. Petersburg. 2012-10-20 - 2012-10-20.
  • Academic lecture
    Mjølsnes, Stig Frode. (2012) Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. 4th International Conference on Digital Forensics & Cyber Crime ICDF2C . Purdue University / European Alliance for Innovation; Lafayette, Indiana. 2012-10-25 - 2012-10-26.
  • Academic lecture
    Mjølsnes, Stig Frode. (2012) Disruption of Cryptoprotocols. Norsk kryptoseminar 2012 . NSM/FRISC; Oslo. 2012-11-07 - 2012-11-08.
  • Academic lecture
    Mjølsnes, Stig Frode. (2012) FRISC; Forum for Research and Innovation in Security and Communications. 5th VERDIKT Conference . NFR; Gardermoen. 2012-04-25 - 2012-04-26.
  • Interview
    Mjølsnes, Stig Frode. (2012) IKT-ekspert: Truer Norges sikkerhet. E24.no [Internett]. 2012-03-23.
  • Academic lecture
    Mjølsnes, Stig Frode. (2012) Invited panel discussion participation: Cyber Intrusion and Attacks Prevention, Detection and Response---Ways to Collaborate. Second International Workshop on Scientific Analysis and Policy Support for Cyber Security . St.Petersburg Institute for Informatics and Automation; St. Petersburg. 2012-10-20 - 2012-10-20.
  • Academic lecture
    Mjølsnes, Stig Frode. (2012) Two Challenges in Computer Network Security. Sixth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security . St.Petersburg Institute for Informatics and Automation; St. Petersburg. 2012-10-17 - 2012-10-19.
  • Interview
    Mjølsnes, Stig Frode; Tunstad, Hege Jørgensen. (2012) Bekymret for Norges IT-sikkerhet. Forskning.no [Internett]. 2012-03-23.
  • Interview
    Mjølsnes, Stig Frode; Vikan, Jonas Alsaker. (2012) Kan hjelpe politiet å knekke kodene (side 2 og 3). Adresseavisen [Avis]. 2012-05-15.
  • Academic lecture
    Tsay, Joe-Kai; Mjølsnes, Stig Frode. (2012) A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. Sixth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security . St.Petersburg Institute for Informatics and Automation; St. Petersburg. 2012-10-16 - 2012-10-19.
  • Academic lecture
    Tsay, Joe-Kai; Mjølsnes, Stig Frode. (2012) Computational Analysis of the UMTS and LTE Authentication and Key Agreement Protocols. 8th Workshop on Formal and Computational Cryptography . Harvard University; Harvard University, Cambridge, MA. 2012-06-27 - 2012-06-28.

2011

  • Academic lecture
    Based, Md Abdul; Mjølsnes, Stig Frode. (2011) A Secure Internet Voting Scheme. Algorithms and Architectures for Parallel Processing 11th International Conference, ICA300 2011 ; 2011-10-24 - 2011-10-26.
  • Academic lecture
    Eian, Martin; Mjølsnes, Stig Frode. (2011) The modeling and comparison of wireless network denial of service attacks. The 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds (MobiHeld '11) . ACM; Cascais. 2011-10-23 - 2011-10-23.
  • Academic lecture
    Mjølsnes, Stig Frode. (2011) Disruption of IEEE 802.11 Availability. Norsk Kryptoseminar 2011 . Universitetet i Bergen; Høyteknologisenteret i Bergen. 2011-10-09 - 2011-10-10.
  • Academic lecture
    Mjølsnes, Stig Frode. (2011) ICT and Forensic Science. Dagstuhl Seminar Forensic Computing (11401 . Leibniz-Zentrum für Informatik GmbH; Schloss Dagstuhl. 2011-10-03 - 2011-10-07.
  • Academic lecture
    Mjølsnes, Stig Frode. (2011) Samfunnets behov for høyere utdanning og forskning i informasjonssikkerhet?. Workshop nasjonale retningslinjer for informasjonssikkerhet . Fornyings-, administrasjons- og kirkedepartementet (FAD); Oslo Militære Samfund. 2011-11-23 - 2011-11-23.

2010

  • Academic lecture
    Based, Md Abdul; Mjølsnes, Stig Frode. (2010) Security Requirements for Internet Voting Systems. International Conference of Telecommunications and Networking (TeNe10) ; Bridgeport. 2010-12-03 - 2010-12-12.
  • Academic lecture
    Based, Md Abdul; Mjølsnes, Stig Frode. (2010) Universally Composable NIZK Protocol in an Internet Voting Scheme. 6th International Workshop on Security and Trust Management (STM'10) ; Athens. 2010-09-23 - 2010-09-24.
  • Academic lecture
    Mjølsnes, Stig Frode. (2010) Detecting Intermediary Hosts by TCP Latency Measurements. 2nd International ICST Conference on Digital Forensics & Cyber Crime . ICST; Abu Dhabi. 2010-10-04 - 2010-10-06.
  • Academic lecture
    Mjølsnes, Stig Frode. (2010) Kryptering i 2010, kryptoanalyse i 2060. Norsk kryptoseminar . NTNU; Trondheim. 2010-11-04 - 2010-11-05.
  • Interview
    Mjølsnes, Stig Frode. (2010) Teleforskning på sotteseng. Norge var i teten, nå er vi akterutseilt. Aftenposten [Avis]. 2010-09-02.
  • Interview
    Mjølsnes, Stig Frode. (2010) Utlendinger tar over IT-doktorgradene. Aftenposten [Avis]. 2010-09-11.
  • Interview
    Mjølsnes, Stig Frode; Kilnes, Camilla. (2010) Enklere for terrorister å sprenge fly NTNU-professor kritisk til bredbånd og mobildekning om bord i fly. Aftenposten [Internett]. 2010-11-03.

2009

  • Academic lecture
    Based, Md Abdul; Mjølsnes, Stig Frode. (2009) A Non-interactive Zero Knowledge Proof Protocol in an Internet Voting Scheme. Norsk informasjonssikkerhetskonferanse - NISK 2009 . NTNU; Trondheim. 2009-11-24 - 2009-11-25.
  • Academic lecture
    Based, Md Abdul; Reistad, Tord Ingolf; Mjølsnes, Stig Frode. (2009) Internet Voting using Multiparty Computations. Norsk informasjonssikkerhetskonferanse - NISK . NTNU; Trondheim. 2009-11-24 - 2009-11-25.
  • Academic lecture
    Kortvedt, Henning Siitonen; Mjølsnes, Stig Frode. (2009) Eavesdropping Near Field Communication. Norsk informasjonssikkerhetskonferanse - NISK 2009 . NTNU; Trondheim. 2009-11-24 - 2009-11-25.
  • Academic lecture
    Mauland, Atle; Reistad, Tord Ingolf; Mjølsnes, Stig Frode. (2009) Realizing Distributed RSA Key Generation using VIFF. Norsk Informasjonssikkerhetskonferanse - NISK 2009 . NTNU; Trondheim. 2009-11-24 - 2009-11-25.
  • Academic lecture
    Mjølsnes, Stig Frode. (2009) Cryptographic Protocols. NISNET Finse PhD Winter School . NISNET; Finse. 2009-05-03 - 2009-05-08.
  • Popular scientific lecture
    Mjølsnes, Stig Frode. (2009) Flere parter, Internett og kryptoprotokoller. NISNET næringslivsseminar 2009 . SINTEF, NTNU, Dataforeningen; NTNU, Trondheim. 2009-11-23 - 2009-11-23.
  • Academic lecture
    Mjølsnes, Stig Frode. (2009) Multiparts privat RSA-nøkkel. Norsk Kryptoseminar 2009 . Inst for matematikk og statistikk, Universitetet i Tromsø; Tromsø. 2009-10-22 - 2009-10-23.
  • Academic lecture
    Ofigsbø, Mona Holsve; Mjølsnes, Stig Frode; Heegaard, Poul Einar; Nilsen, Leif. (2009) Reducing the Cost of Certificate Revocation: A Case Study. EUROPKI'09 - Sixth European Workshop on Public Key Services, Applications and Infrastructures ; Pisa. 2009-09-10 - 2009-09-11.

2006

  • Academic lecture
    Mjølsnes, Stig Frode. (2006) NTNU Multidisciplinary Research Program for Information Security; a presentation of the activity. European Conference on Security Research . European Commission, Austrian Research Centers GmbH; Wien. 2006-02-20 - 2006-02-21.
  • Academic lecture
    Andova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2006) An example of proving UC-realization with formal methods. The 2nd Workshop on Formal and Computational Cryptography FCC 2006 . ACM; Venice. 2006-07-09 - 2006-07-09.

2005

  • Academic lecture
    Eian, Martin; Mjølsnes, Stig Frode. (2005) Large Scale Single Sign-on Scheme by Digital Certificates On the fly. Norwegian Network Research Seminar 2005 . Simula Research Lab. Universitetet i Oslo; Oslo. 2005-10-27 - 2005-10-28.
  • Academic lecture
    Mjølsnes, Stig Frode. (2005) Health Records by Cryptographic Pseudonyms. 2. VLDB Workshop on SECURE DATA MANAGEMENT SDM'05 . VLDB; Trondheim. 2005-09-02 - 2005-09-03.
  • Academic lecture
    Mjølsnes, Stig Frode; Sallhammar, Karin. (2005) Teaching Information Security by Software Laboratory Didactics. IADAT-e2005 International Conference on Education . IADAT; Biarritz. 2005-07-07 - 2005-07-09.
  • Academic lecture
    Hegland, Anne Marie; Winjum, Eli; Kure, Øivind; Mjølsnes, Stig Frode; Rong, Chunming; Spilling, Pål. (2005) Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations. Norsk informatikkonferanse NIK'2005 ; Bergen. 2005-11-21 - 2005-11-23.
  • Academic lecture
    Mjølsnes, Stig Frode. (2005) Hva truer i den globale landsbyen - og på hvilken måte? Hva gjør vi med informasjonssikkerheten?. Seminar om datakriminalitet . NOU Datakrimutvalget ved Knut Rønning; Gardermoen. 2005-10-25 - 2005-10-25.

2004

  • Academic lecture
    Mjølsnes, Stig Frode. (2004) Desentraliserte kreditiver og identifiseringsprotokoller. Norsk kryptoseminar 2004 . NTNU; Trondheim. 2004-11-08 - 2004-11-09.

2003

  • Academic lecture
    Gjerde, Marius; Mjølsnes, Stig Frode; Buan, Aslak Bakke. (2003) Decentralized Credentials. NORDSEC 2003 . [Mangler data]; Gjøvik. 2003-10-17.
  • Academic lecture
    Gjerde, Marius; Mjølsnes, Stig Frode; Buan, Aslak Bakke. (2003) Digital Signatures by Decentralized Credentials. NIK'2003 . [Mangler data]; Oslo. 2003-11-26.
  • Academic lecture
    Mjølsnes, Stig Frode. (2003) E-wallet Software Architecture with Decentralized Credentials. NIK'2003 . [Mangler data]; Oslo. 2003-11-26.
  • Interview
    Mjølsnes, Stig Frode. (2003) Virus koster flesk. Adresseavisen null [Avis]. 2003-08-26.
  • Academic lecture
    Quoos, Luciane; Mjølsnes, Stig Frode. (2003) Extending Public-key cryptosystems to GF(p^10). 7th International Conference on Finite Field, Toulouse (France) May 5 - 9, 2003 . [Mangler data]; Toulouse (France). 2003-05-09.

2001

  • Academic lecture
    Mjølsnes, Stig Frode; Forssell, Börje. (2001) GALILEO and location-based services. NORSIG 2001 . [Mangler data]; Trondheim. 2001-10-20.
  • Academic lecture
    Mjølsnes, Stig Frode; Forssell, Börje. (2001) GALILEO and location-based services. NORSIG 2001 ; Trondheim. 2001-10-19 - 2001-10-20.
  • Academic lecture
    Mjølsnes, Stig Frode; Rong, Chunming. (2001) Localized Credentials for Server Assisted Mobile Wallet. 2001 International Conference on Computer Networks and Mobile Computing ; Beijing, China. 2001-10-16 - 2001-10-19.

2000

  • Poster
    Mjølsnes, Stig Frode. (2000) Security of Access Service for GNSS. EMPS 2000 ; London, 18 September 2000.
NTNU
Studies
  • Master's programmes in English
  • For exchange students
  • PhD opportunities
  • Courses
  • Career development
  • Continuing education
  • Application process
Contact
  • Contact NTNU
  • Employees
  • For alumni
  • Press contacts
  • Researcher support
Discover NTNU
  • Experts
  • Vacancies
  • Pictures from NTNU
  • Innovation resources
  • NTNU in Gjøvik
  • NTNU in Trondheim
  • NTNU in Ålesund
  • Maps
About NTNU
  • NTNU's strategy
  • Research excellence
  • Strategic research areas
  • Organizational chart
  • Libraries
  • About the university
Services
  • For employees
  • For students
  • Blackboard
  • Intranet

Norwegian University of Science and Technology

About cookies
Privacy policy
Editoral responsibility
Sign In