2008 |
10 | EE | Stefan Lindskog,
Anna Brunstrom:
An End-to-End Security Solution for SCTP.
ARES 2008: 526-531 |
9 | EE | Ulf Larson,
Erland Jonsson,
Stefan Lindskog:
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection.
ARES 2008: 624-629 |
8 | EE | Stefan Lindskog,
Anna Brunstrom:
The Design and Message Complexity of Secure Socket SCTP.
ICCSA (2) 2008: 484-499 |
7 | EE | Stefan Lindskog,
Zoltán Faigl,
Anna Brunstrom:
A Conceptual Model for Analysis and Design of Tunable Security Services.
JNW 3(5): 1-12 (2008) |
2007 |
6 | | Reine Lundin,
Thijs Holleboom,
Stefan Lindskog:
On the Relationship between Confidentiality Measures: Entropy and Guesswork.
WOSIS 2007: 135-144 |
5 | EE | Stefan Lindskog,
Hans Hedbom,
Leonardo A. Martucci,
Simone Fischer-Hübner:
Experiences from Educating Practitioners in Vulnerability Analysis.
World Conference on Information Security Education 2007: 73-80 |
2006 |
4 | | Simone Fischer-Hübner,
Kai Rannenberg,
Louise Yngström,
Stefan Lindskog:
Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
Springer 2006 |
3 | | Stefan Lindskog,
Reine Lundin,
Anna Brunstrom:
Middleware Support for Tunable Encryption.
Wireless Information Systems 2006: 36-46 |
2005 |
2 | EE | Stefan Lindskog,
Karl-Johan Grinnemo,
Anna Brunstrom:
Data Protection Based on Physical Separation: Concepts and Application Scenarios.
ICCSA (4) 2005: 1331-1340 |
2004 |
1 | EE | Stefan Lindskog,
Johan Strandbergh,
Mikael Hackman,
Erland Jonsson:
A Content-Independent Scalable Encryption Model.
ICCSA (1) 2004: 821-830 |