关注
Geir M. Køien
Geir M. Køien
Prof. Cyber security, University of South-Eastern Norway (USN)
在 acm.org 的电子邮件经过验证
标题
引用次数
引用次数
年份
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
M Abomhara, GM Køien
Journal of Cyber Security 4, 65-88, 2015
8842015
Security and privacy in the Internet of Things: Current status and open issues
M Abomhara, GM Køien
2014 international conference on privacy and security in mobile systems …, 2014
5722014
Security aspects of 3G-WLAN interworking
GM Køien, T Haslestad
Communications Magazine, IEEE 41 (11), 82-88, 2003
1672003
An introduction to access security in UMTS
GM Koien
IEEE Wireless Communications 11 (1), 8-18, 2004
1152004
Reflections on trust in devices: an informal survey of human trust in an internet-of-things context
GM Køien
Wireless personal communications 61, 495-510, 2011
802011
Mutual entity authentication for LTE
GM Køien
2011 7th International Wireless Communications and Mobile Computing …, 2011
672011
A stride-based threat model for telehealth systems
M Abomhara, M Gerdes, GM Køien
Norsk informasjonssikkerhetskonferanse (NISK) 8 (1), 82-96, 2015
552015
Access security in CDMA2000, including a comparison with UMTS access security
G Rose, GM Koien
IEEE Wireless Communications 11 (1), 19-25, 2004
502004
Location privacy for cellular systems; analysis and solution
GM Køien, VA Oleshchuk
International Workshop on Privacy Enhancing Technologies, 40-58, 2005
402005
Globalization of mobile and wireless communications: Today and in 2020
R Prasad, S Dixit, R Van Nee, T Ojanpera
Springer Science+ Business Media BV, 2011
372011
Privacy enhanced mutual authentication in LTE
GM Koien
2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013
342013
Location-aware mobile intrusion detection with enhanced privacy in a 5G context
N Ulltveit-Moe, VA Oleshchuk, GM Køien
Wireless Personal Communications 57, 317-338, 2011
342011
Aspects of Personal Privacy in Communications-Problems, Technology and Solutions
GM Køien, VA Oleshchuk
River Publishers, 2013
332013
Privacy enhanced cellular access security
GM Køien
Proceedings of the 4th ACM workshop on Wireless security, 57-66, 2005
272005
On threats to the 5G service based architecture
GM Køien
Wireless Personal Communications 119 (1), 97-116, 2021
262021
Zero-trust principles for legacy components: 12 rules for legacy devices: an antidote to chaos
GM Køien
Wireless Personal Communications 121 (2), 1169-1186, 2021
222021
Security and Privacy in the Cloud-A Long-Term View
VA Oleshchuk, GM Køien
2nd International Conference on Wireless Communications, Vehicular …, 2011
222011
Resource, mobility, and security management in wireless networks and mobile communications
Y Zhang, H Hu, M Fujise
CRC Press, 2006
202006
Entity authentication and personal privacy in future cellular systems
GM Køien
River Publishers, 2009
19*2009
Access control model for cooperative healthcare environments: Modeling and verification
M Abomhara, H Yang, GM Køien
2016 IEEE International Conference on Healthcare Informatics (ICHI), 46-54, 2016
182016
系统目前无法执行此操作,请稍后再试。
文章 1–20