Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 139 << Forrige 1 2 3    Neste >>

2020
1 Nätt, Tom Heine; Knapskog, Svein Johan.
Løk-ruting. Store Norske Leksikon (Nettutgaven) 2020
HIOF Untitled
 
2019
2 Nätt, Tom Heine; Knapskog, Svein Johan.
Autentisering. Store Norske Leksikon (Nettutgaven) 2019
HIOF Untitled
 
2013
3 Chen, Yanling; Gligoroski, Danilo; Knapskog, Svein Johan.
On a special class of multivariate quadratic quasigroups (MQQs). Journal of Mathematical Cryptology 2013 ;Volum 7.(2) s. 111-141
NTNU Untitled
 
2012
4 Aly, Mohamed Ezzat El Hadedy.
Implementing Algorithms on FPGA Platforms. Tapir Akademisk Forlag 2012 (ISBN 978-82-471-3332-3) 177 s.
NTNU Untitled
 
5 Chia, Pern Hui.
Information Security on the Web and App Platforms - An Economic and Socio-Behavioral Perspective. Tapir Akademisk Forlag 2012 (ISBN 978-82-471-3969-1) 165 s.
NTNU Untitled
 
6 Chia, Pern Hui.
Information Security on the Web and App Platforms: An Economic and Socio-Behavioral Perspective. Trondheim: NTNU 2012 (ISBN 978-82-471-3969-1) 177 s. Doktoravhandlinger ved NTNU(324)
NTNU Untitled
 
7 Chia, Pern Hui; Knapskog, Svein Johan.
Re-evaluating the Wisdom of Crowds in Assessing Web Security. Lecture Notes in Computer Science (LNCS) 2012 ;Volum 7035. s. 299-314
NTNU Untitled
 
8 Gligoroski, Danilo; Knapskog, Svein Johan; Amundsen, Jørn; Jensen, Rune Erlend.
Internationally Standardized Efficient Cryptographic Hash Function. ICT Innovations 2012 - "Secure and Intelligent Systems"; 2012-09-12 - 2012-09-15
NTNU Untitled
 
9 Knapskog, Svein Johan.
Kryptografi - Grunnleggende teknikk for sikring av informasjon. Carl Schulz's festmøte; 2012-11-14 - 2012-11-14
NTNU Untitled
 
10 Knapskog, Svein Johan.
Kryptografi Grunnleggende teknikk for sikring av informasjon. Tekna Kursdagene 2012; 2012-01-05 - 2012-01-06
NTNU Untitled
 
11 Knapskog, Svein Johan.
Rekruttering og personalpolitikk i praksis. NAV Eures årsmøte 2012; 2012-04-26 - 2012-04-26
NTNU Untitled
 
12 Tavakolifard, Mozhgan.
On Some Challenges for Online Trust and Reputation Systems. Tapir Akademisk Forlag 2012 (ISBN 978-82-471-3535-8) ;Volum 2012.215 s. Doktoravhandlinger ved NTNU(127)
NTNU Untitled
 
13 Westermann, Benedikt.
Challenges of Anonymous Communication; Bridging Gaps Between Theory and Practice. Tapir Akademisk Forlag 2012 (ISBN 978-82471-3301-9) 166 s.
NTNU Untitled
 
14 Ødegård, Rune Steinsmo.
Hash Functions and Gröbner Bases Cryptanalysis. Tapir Akademisk Forlag 2012 (ISBN 978-82-471-3501-3) 234 s.
NTNU Untitled
 
2011
15 Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan.
Area Efficient Processing Element Architecture for Compact Hash Functions Systems on VIRTEX5 FPGA Platform. I: Adaptive Hardware and Systems (AHS), 2011 NASA/ESA. IEEE 2011 ISBN 978-1-4577-0598-4. s. 240-247
NTNU Untitled
 
16 Aly, Mohammed Ezzat El-Hadedy; Pitsilis, Georgios; Knapskog, Svein Johan.
An Efficient Authorship Protection Scheme for Shared Multimedia Content. I: Proceedings of the Sixth International Conference on Image and Graphics. IEEE 2011 ISBN 978-0-7695-4541-7. s. 914-919
NTNU Untitled
 
17 Chen, Yanling; Gligoroski, Danilo; Knapskog, Svein Johan.
A standard form of the MQQ generating function and its applications. Loops' 11; 2011-07-21 - 2011-07-27
NTNU Untitled
 
18 Chen, Yanling; Vinck, A. J. Han; Gligoroski, Danilo; Knapskog, Svein Johan.
An overview of the information-theoretic perspective on biometric systems. I: Norsk informasjonssikkerhetskonferanse, NISK 2011. Tapir Akademisk Forlag 2011 ISBN 978-82-519-28472. s. 31-42
NTNU Untitled
 
19 Gligoroski, Danilo; Knapskog, Svein Johan; Amundsen, Jørn Aslak; Jensen, Rune Erlend.
Internationally Standardized Efficient Cryptographic Hash Function. SECRYPT 2011; 2011-07-18 - 2011-07-21
NTNU Untitled
 
20 Gligoroski, Danilo; Knapskog, Svein Johan; Amundsen, Jørn Aslak; Jensen, Rune Erlend.
Internationally Standardized Efficient Cryptographic Hash Function. I: SECRYPT 2011 International Conference on Security and Cryptography - Proceedings. SciTePress 2011 ISBN 978-989-8425-71-3. s. 426-433
NTNU Untitled
 
21 Gligoroski, Danilo; Knapskog, Svein Johan; Samardjiska, Simona.
The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies. NIST Workshop on Cryptography for Emerging Technologies and Applications; 2011-11-07 - 2011-11-08
NTNU Untitled
 
22 Gligoroski, Danilo; Ødegård, Rune Steinsmo; Jensen, Rune Erlend; Perret, Ludovic; Faugère, Jean-Charles; Knapskog, Svein Johan; Markovski, Smile.
MQQ-SIG, An Ultra-fast and Provably CMA Resistant Digital Signature Scheme. INTRUST 2011 : The Third International Conference on Trusted Systems; 2011-11-27 - 2011-11-29
NTNU Untitled
 
23 Knapskog, Svein Johan.
ICT Security Evaluation. I: A Multidisciplinary Introduction to Information Security. CRC Press 2011 ISBN 978-1-4200-8590-7. s. 217-240
NTNU Untitled
 
24 Tavakolifard, Mozhgan; Knapskog, Svein Johan.
Trust Evaluation Initialization Using Contextual Information. The International Conference on Management of Emergent Digital EcoSystems (MEDES); 2011-11-21 - 2011-11-24
NTNU Untitled
 
25 Tavakolifard, Mozhgan; Knapskog, Svein Johan.
Trust Evaluation Initialization Using Contextual Information. I: Proceeding of the International Conference on Management of Emergent Digital EcoSystems (MEDES'11). ACM Publications 2011 ISBN 978-1-4503-1047-5.
NTNU Untitled
 
26 Westermann, Benedikt; Gligoroski, Danilo; Knapskog, Svein Johan.
Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates. I: ICT Innovations 2010, CCIS Vol 83. Springer 2011 ISBN 978-3-642-19324-8. s. 102-113
NTNU Untitled
 
2010
27 Aagesen, Finn Arve; Knapskog, Svein Johan.
Networked Services and Applications - Engineering, Control and Management. Springer 2010 (ISBN 978-3-642-13970-3) 273 s. Lecture Notes in Computer Science(6164)
NTNU Untitled
 
28 Aagesen, Finn Arve; Knapskog, Svein Johan.
Networked services and applications : 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010 : proceedings. Springer 2010 (ISBN 978-3-642-13970-3) 273 s. Lecture Notes in Computer Science(6164)
NTNU Untitled
 
29 Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan.
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform. : eprints@USM 2010 1500 s.
NTNU Untitled
 
30 Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan; Margala, Martin.
Compact Implementation of BLUE MIDNIGHT WISH-256 Hash Function on Xilinx FPGA Platform. Journal of Information Assurance and Security 2010 ;Volum 5. s. 626-636
NTNU Untitled
 
31 Aly, Mohamed Ezzat El Hadedy; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein Johan.
Implementing The Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform. I: 2010 International Conference on ReConFigurable Computing and FPGAs. IEEE 2010 ISBN 9780769543147. s. 394-399
NTNU Untitled
 
32 Aly, Mohamed Ezzat El Hadedy; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein Johan.
Implementing The Blue MidnightWish Hash Function on Xilinx Virtex-5 FPGA Platform. International Conference on Reconfigurable Computing and FPGAs, ReConFig10; 2010-12-13 - 2010-12-15
NTNU Untitled
 
33 Aly, Mohamed Ezzat El Hadedy; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein Johan.
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. I: 2010 Sixth International Symposium on Information Assurance and Security (IAS). IEEE conference proceedings 2010 ISBN 978-1-4244-7408-0. s. 44-47
NTNU Untitled
 
34 Aly, Mohamed Ezzat El Hadedy; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein Johan.
Resource-Efficient Implementation of the Blue Midnight Wish-256” Hash Function on Xilinx FPGA Platform. Information Assurance and Security (IAS), 2010 Sixth International Conference; 2010-08-23 - 2010-08-25
NTNU Untitled
 
35 Aly, Mohamed Ezzat El Hadedy; Purohit, Sohan; Margala, Martin; Knapskog, Svein Johan.
Low Latency Transpose Memory for High Throughput Signal Processing. The 8th edition of the International Conference NEWCAS; 2010-06-20 - 2010-06-23
NTNU Untitled
 
36 Aly, Mohamed Ezzat El Hadedy; Purohit, Sohan; Margala, Martin; Knapskog, Svein Johan.
Performance and area efficient transpose memory architecture for high throughput adaptive signal processing systems. Adaptive Hardware and Systems (AHS), 2010 NASA/ESA; 2010-06-15 - 2010-06-18
NTNU Untitled
 
37 El-Hadedy, Mohamed; purohit, sohan; margala, Martin; Knapskog, Svein Johan.
Low Latency Transpose Memory for High Throughput Signal Processing. I: 8th IEEE International NEWCAS conference. IEEE 2010 ISBN 978-1-4244-6806-5.
NTNU Untitled
 
38 Gladysh, Sergiy; Herrmann, Peter Michael; Knapskog, Svein Johan.
User-Centered Security, Privacy and Trust in Ubiquitous Social Network Services. The VERDIKT Conference 2010; 2010-11-01 - 2010-11-02
NTNU Untitled
 
39 Haslum, Kjetil.
Real-time Network Intrusion Prevention. Tapir Akademisk Forlag 2010 (ISBN 978-82-471-2308-9) 172 s.
NTNU Untitled
 
40 Markovski, Smile; Samardjiska, Simona; Gligoroski, Danilo; Knapskog, Svein Johan.
Multivariate Trapdoor Functions Based on Multivariate Left Quasigroups and Left Polynomial Quasigroups. Conference on Symbolic Computation and Cryptography; 2010-06-23 - 2010-06-25
NTNU Untitled
 
2009
41 Pitsilis, Georgios; Knapskog, Svein Johan.
Social Trust as a solution to address sparsity-inherent problems of Recommender systems. Workshop held at 3rd ACM Conference on Recommender Systems; 2009-10-25 - 2009-10-25
NTNU Untitled
 
42 Tavakolifard, Mozhgan; Herrmann, Peter; Knapskog, Svein Johan.
Inferring Trust Based on Similarity with TILLIT (presentation). IFIPTM 2009 : Third IFIP WG 11.11 International Conference on Trust Management Bookmark and Share; 2009-06-15 - 2009-06-19
NTNU Untitled
 
43 Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan.
Low Area Implementation of the Hash Function "Blue Midnight Wish – 256" for FPGA platforms. I: Proceedings of The International Conference on Intelligent Networking and Collaborative Systems. IEEE 2009 ISBN 978-0-7695-3858-7. s. 100-104
NTNU Untitled
 
44 Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan; Aas, Einar Johan.
Low Area FPGA and ASIC Implementations of the Hash Function “Blue Midnight Wish-256. I: Proceedings, ICCES’09, The 2009 International Conference on Computer Engineering & Systems. IEEE conference proceedings 2009 ISBN 978-1-4244-5843-1. s. 10-14
NTNU Untitled
 
45 Gligoroski, Danilo; Markovski, Smile; Knapskog, Svein Johan.
A new measure to estimate pseudo-randomness of Boolean functions and relations with Groebner bases. I: Groebner Bases, Coding, and Cryptography. Springer 2009 ISBN 978-3-540-93805-7. s. 421-426
NTNU Untitled
 
46 Jøsang, Audun; Maseng, Torleiv; Knapskog, Svein Johan.
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems. Springer Publishing Company 2009 (ISBN 978-3-642-04765-7) 303 s. Lecture Notes in Computer Science(5838)
FFI NTNU UiO Untitled
 
47 Knapskog, Svein Johan.
Cryptographic Hash Function BLUE MIDNIGHT WISH. The First SHA-3 Candidate Conference; 2009-02-25 - 2009-02-28
NTNU Untitled
 
48 Knapskog, Svein Johan.
Fra Forskningsfronten. Sikkerhet og sårbarhet 2009; 2009-05-12 - 2009-05-13
NTNU Untitled
 
49 Knapskog, Svein Johan; Lindskog, Stefan.
Proceedings of the 1st International Workshop on Security and Communication Networks. Trondheim, Norway: Norwegian University of Science and Technology 2009 (ISBN 978-82-997105-1-0) 132 s.
NTNU Untitled
 
50 Knapskog, Svein Johan; Lindskog, Stefan.
1st International Workshop on Security and Communication Networks. : IEEE Xplore 2009 (ISBN 978-82-997105-1-0) 132 s.
NTNU Untitled
 
    Vis neste liste