Stig Frode Mjølsnes
Background and activities
Courses
- TTM4905 - Communication Technology, Master's Thesis
- TTM4502 - Communication Technology, Specialization Project
- TM8107 - Cryptographic Protocols and Their Applications
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
Journal publications
- (2019) Private Identification of Subscribers in Mobile Networks: Status and Challenges. IEEE Communications Magazine. vol. 57 (9).
- (2019) Experimental Analysis of Subscribers’ Privacy Exposure by LTE Paging. Wireless personal communications. vol. 109.
- (2018) Distributed Personal Password Repository using Secret Sharing. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 11 (1).
- (2018) User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 2017: NISK2017.
- (2018) Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging. arXiv.org.
- (2017) Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. Lecture Notes in Computer Science (LNCS). vol. 10311.
- (2017) Easy 4G/LTE IMSI Catchers for Non-Programmers. Lecture Notes in Computer Science (LNCS). vol. 10446 LNCS.
- (2017) Introducing Mobile Network Security Experiments to Communication Technology Education. IFIP Advances in Information and Communication Technology. vol. 503.
- (2017) The Challenge of Private Identification. IFIP International Federation for Information Processing. vol. TC 11 (eCollection-1).
- (2017) On low-cost privacy exposure attacks in LTE mobile communication. Proceedings of the Romanian Academy. Series A Mathematics, Physics, Technical Sciences, Information Science. vol. 18 (Special issue 2017).
- (2013) Security Analysis of the Terrestrial Trunked Radio (TETRA) Authentication Protocol. Norsk Informasjonssikkerhetskonferanse (NISK). vol. 2 (1).
- (2013) Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. vol. 114.
- (2012) A Formal Analysis of IEEE 802.11w Deadlock Vulnerabilities. IEEE Infocom. Proceedings.
- (2012) A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. Lecture Notes in Computer Science (LNCS). vol. 7531.
- (2011) A Secure Internet Voting Scheme. Lecture Notes in Computer Science (LNCS). vol. 7017.
- (2011) Universally Composable NIZK Protocol in an Internet Voting Scheme. Lecture Notes in Computer Science (LNCS). vol. 6710.
- (2011) Detecting Intermediary Hosts by TCP Latency Measurements. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. vol. 53.
- (2010) Multiparty Ballot Counting in an Internet Voting Scheme. Acta Electrotechnica et Informatica. vol. 10 (4).
- (2010) Reducing the Cost of Certificate Revocation: A Case Study. Lecture Notes in Computer Science (LNCS). vol. 6391.
- (2008) A framework for compositional verification of security protocols. Information and Computation. vol. 206 (2-4).