The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kjell Jørgen Hole: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim
    Securing Wi-Fi Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:7, pp:28-34 [Journal]
  2. Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim
    Case Study: Online Banking Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:14-20 [Journal]
  3. Kjell Jørgen Hole, Henrik Holm, Gseis. E. Oien
    Adaptive multidimensional coded modulation over flat fading channels. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 2000, v:18, n:7, pp:1153-1158 [Journal]
  4. Vebjørn Moen, Håvard Raddum, Kjell Jørgen Hole
    Weaknesses in the temporal key hash of WPA. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2004, v:8, n:2, pp:76-83 [Journal]
  5. Kjell Jørgen Hole
    On classes of convolutional codes that are not asymptotically catastrophic. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:663-669 [Journal]
  6. Kjell Jørgen Hole
    New short constraint length rate (n-1)/n punctured convolutional codes for soft-decision Viterbi decoding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:5, pp:1079-0 [Journal]
  7. Kjell Jørgen Hole
    Rate k/(k + 1) punctured convolutional encoders. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:3, pp:653-0 [Journal]
  8. Kjell Jørgen Hole
    Punctured convolutional codes for the 1-D partial-response channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:3, pp:808-817 [Journal]
  9. Kjell Jørgen Hole
    Cosets of convolutional codes with short maximum zero-run lengths. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1995, v:41, n:4, pp:1145-1150 [Journal]
  10. M. F. Hole, Kjell Jørgen Hole
    Low-complexity decoding of partial unit memory codes on precoded partial-response channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:3, pp:1052-1058 [Journal]
  11. M. F. Hole, Kjell Jørgen Hole
    Tight bounds on the minimum average weight per branch for rate (N-1)/N convolutional codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:4, pp:1301-1305 [Journal]
  12. Kjell Jørgen Hole, Øyvind Ytrehus
    Improved coding techniques for preceded partial-response channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:2, pp:482-493 [Journal]
  13. Kjell Jørgen Hole, Øyvind Ytrehus
    Cosets of Convolutional Codes with Least Possible Maximum Zero- and One-Run Lengths. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:1, pp:423-431 [Journal]
  14. Anders Gjendemsjø, Geir E. Øien, Henrik Holm, Mohamed-Slim Alouini, David Gesbert, Kjell Jørgen Hole, Pål Orten
    Rate and Power Allocation for Discrete-Rate Link Adaptation [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  15. Identity Theft: Much Too Easy? A Study of Online Systems in Norway. [Citation Graph (, )][DBLP]


  16. A Proof of Concept Attack against Norwegian Internet Banking Systems. [Citation Graph (, )][DBLP]


  17. Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks. [Citation Graph (, )][DBLP]


  18. Security Analysis of Mobile Phones Used as OTP Generators. [Citation Graph (, )][DBLP]


  19. Challenges in Securing Networked J2ME Applications. [Citation Graph (, )][DBLP]


Search in 0.093secs, Finished in 0.094secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002