Search the dblp DataBase
Einar Snekkenes :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Klaus Gaarder , Einar Snekkenes On The Formal Analysis of PKCS Authentication Protocols. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:106-121 [Conf ] Marijana Kosmerlj , Tom Fladsrud , Erik Hjelmås , Einar Snekkenes Face Recognition Issues in a Border Control Environment. [Citation Graph (0, 0)][DBLP ] ICB, 2006, pp:33-39 [Conf ] Geir Olav Dyrkolbotn , Einar Snekkenes A Wireless Covert Channel on Smart Cards (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:249-259 [Conf ] Hågen Hasle , Yngve Kristiansen , Ketil Kintel , Einar Snekkenes Measuring Resistance to Social Engineering. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:132-143 [Conf ] Davrondzhon Gafurov , Einar Snekkenes , Tor Erik Buvarp Robustness of Biometric Gait Authentication Against Impersonation Attack. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:479-488 [Conf ] Einar Snekkenes Authentication in Open Systems. [Citation Graph (0, 0)][DBLP ] PSTV, 1990, pp:311-324 [Conf ] Einar Snekkenes Concepts for personal location privacy policies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Electronic Commerce, 2001, pp:48-57 [Conf ] Einar Snekkenes Exploring the BAN Approach to Protocol Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:171-181 [Conf ] Einar Snekkenes Preface to the special issue on ESORICS 2003. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:3, pp:133-134 [Journal ] Klaus Gaarder , Einar Snekkenes Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:3, n:2, pp:81-98 [Journal ] Improved Gait Recognition Performance Using Cycle Matching. [Citation Graph (, )][DBLP ] Towards understanding the uniqueness of gait biometric. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.004secs