2008 |
13 | EE | Davrondzhon Gafurov,
Einar Snekkenes:
Towards understanding the uniqueness of gait biometric.
FG 2008: 1-8 |
2007 |
12 | EE | Davrondzhon Gafurov,
Einar Snekkenes,
Patrick A. H. Bours:
Spoof Attacks on Gait Authentication System.
IEEE Transactions on Information Forensics and Security 2(3-2): 491-502 (2007) |
2006 |
11 | EE | Marijana Kosmerlj,
Tom Fladsrud,
Erik Hjelmås,
Einar Snekkenes:
Face Recognition Issues in a Border Control Environment.
ICB 2006: 33-39 |
10 | EE | Geir Olav Dyrkolbotn,
Einar Snekkenes:
A Wireless Covert Channel on Smart Cards (Short Paper).
ICICS 2006: 249-259 |
9 | EE | Davrondzhon Gafurov,
Einar Snekkenes,
Tor Erik Buvarp:
Robustness of Biometric Gait Authentication Against Impersonation Attack.
OTM Workshops (1) 2006: 479-488 |
2005 |
8 | EE | Hågen Hasle,
Yngve Kristiansen,
Ketil Kintel,
Einar Snekkenes:
Measuring Resistance to Social Engineering.
ISPEC 2005: 132-143 |
7 | EE | Einar Snekkenes:
Preface to the special issue on ESORICS 2003.
Int. J. Inf. Sec. 4(3): 133-134 (2005) |
2003 |
6 | | Einar Snekkenes,
Dieter Gollmann:
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings
Springer 2003 |
2001 |
5 | EE | Einar Snekkenes:
Concepts for personal location privacy policies.
ACM Conference on Electronic Commerce 2001: 48-57 |
1991 |
4 | | Einar Snekkenes:
Exploring the BAN Approach to Protocol Analysis.
IEEE Symposium on Security and Privacy 1991: 171-181 |
3 | | Klaus Gaarder,
Einar Snekkenes:
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol.
J. Cryptology 3(2): 81-98 (1991) |
1990 |
2 | | Klaus Gaarder,
Einar Snekkenes:
On The Formal Analysis of PKCS Authentication Protocols.
AUSCRYPT 1990: 106-121 |
1 | | Einar Snekkenes:
Authentication in Open Systems.
PSTV 1990: 311-324 |