[HTML][HTML] A methodology for security classification applied to smart grid infrastructures

M Shrestha, C Johansen, J Noll, D Roverso - International Journal of …, 2020 - Elsevier
The electricity grid is an important critical infrastructure that is undergoing major changes,
due to the Internet of Things (IoT) and renewable energy, heading towards the smart grid …

[PDF][PDF] Diamonds for security: a non-interleaving operational semantics for the applied pi-calculus

C Aubert, R Horne, C Johansen - 2022 - ntnuopen.ntnu.no
We introduce a non-interleaving structural operational semantics for the applied π-calculus
and prove that it satisfies the properties expected of a labelled asynchronous transition …

Comparing implementations of secure messaging protocols (long version)

C Johansen, A Mujaj, H Arshad, J Noll - 2017 - duo.uio.no
In recent years, it has come to attention that governments have been doing mass
surveillance of personal communications without the consent of the citizens. As a …

Offline trusted device and proxy architecture based on a new TLS switching technique

M Denis, C Johansen, A Jøsang - 2017 International Workshop …, 2017 - ieeexplore.ieee.org
Infection of client devices poses a significant threat to secure user authentication. Combining
vulnerable client devices with special security devices, as often the case in e-banking, can …

Criteria for security classification of smart home energy management systems (long version)

M Shrestha, C Johansen, J Noll - Research report http://urn. nb. no/URN …, 2019 - duo.uio.no
Internet of Things (IoT) is a growing field and its use in home automation is one of the
dominating application areas. The heterogeneity and limited capacity of storage and …