default search action
Einar Snekkenes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c43]Adam Szekeres, Einar Snekkenes:
Inferring Delay Discounting Factors from Public Observables: Applications in Risk Analysis and the Design of Adaptive Incentives. CHIRA 2021: 70-80 - [c42]Adam Szekeres, Einar Snekkenes:
Human Behavior Prediction for Risk Analysis. ICCSA (3) 2021: 288-303 - 2020
- [j12]Adam Szekeres, Einar Arthur Snekkenes:
Construction of Human Motivational Profiles by Observation for Risk Analysis. IEEE Access 8: 45096-45107 (2020) - [c41]Adam Szekeres, Einar Snekkenes:
Representing Decision-Makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer. GraMSec@CSF 2020: 87-110 - [c40]Prosper Kandabongee Yeng, Livinus Obiora Nweke, Ashenafi Zebene Woldaregay, Bian Yang, Einar Arthur Snekkenes:
Data-Driven and Artificial Intelligence (AI) Approach for Modelling and Analyzing Healthcare Security Practice: A Systematic Review. IntelliSys (1) 2020: 1-18
2010 – 2019
- 2019
- [c39]Prosper Kandabongee Yeng, Bian Yang, Einar Arthur Snekkenes:
Framework for Healthcare Security Practice Analysis, Modeling and Incentivization. IEEE BigData 2019: 3242-3251 - [c38]Prosper Kandabongee Yeng, Bian Yang, Einar Snekkenes:
Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices. COMPSAC (2) 2019: 397-404 - [c37]Adam Szekeres, Einar Arthur Snekkenes:
A Taxonomy of Situations within the Context of Risk Analysis. FRUCT 2019: 306-316 - [c36]Adam Szekeres, Pankaj Shivdayal Wasnik, Einar Arthur Snekkenes:
Using Demographic Features for the Prediction of Basic Human Values Underlying Stakeholder Motivation. ICEIS (2) 2019: 377-389 - [c35]Prosper Kandabongee Yeng, Bian Yang, Einar Arthur Snekkenes:
Healthcare Staffs' Information Security Practices Towards Mitigating Data Breaches: A Literature Survey. pHealth 2019: 239-245 - 2018
- [j11]Gaute Wangen, Christoffer Hallstensen, Einar Snekkenes:
A framework for estimating information security risk assessment method completeness - Core Unified Risk Framework, CURF. Int. J. Inf. Sec. 17(6): 681-699 (2018) - [c34]Vivek Agrawal, Einar Arthur Snekkenes:
Secure Benchmarking using Electronic Voting. ICETE (2) 2018: 191-206 - [c33]Adam Szekeres, Einar Arthur Snekkenes:
Unobtrusive Psychological Profiling for Risk Analysis. ICETE (2) 2018: 376-386 - 2017
- [c32]Vivek Agrawal, Einar Arthur Snekkenes:
Factors Affecting the Willingness to Share Knowledge in the Communities of Practice. CRIWG 2017: 32-39 - [c31]Vivek Agrawal, Pankaj Wasnik, Einar Arthur Snekkenes:
Factors Influencing the Participation of Information Security Professionals in Electronic Communities of Practice. KMIS 2017: 50-60 - [c30]Vivek Agrawal, Einar Arthur Snekkenes:
UnRizkNow: An open electronic community of practice for information security professionals. ICETC 2017: 191-197 - [e3]Simon N. Foley, Dieter Gollmann, Einar Snekkenes:
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10492, Springer 2017, ISBN 978-3-319-66401-9 [contents] - [e2]Simon N. Foley, Dieter Gollmann, Einar Snekkenes:
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10493, Springer 2017, ISBN 978-3-319-66398-2 [contents] - 2016
- [j10]Pankaj Pandey, Einar Snekkenes:
Using Financial Instruments to Transfer the Information Security Risks. Future Internet 8(2): 20 (2016) - 2015
- [j9]Waqas Aman, Einar Snekkenes:
EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things. Future Internet 7(3): 225-256 (2015) - [c29]Waqas Aman, Einar Snekkenes:
Managing security trade-offs in the Internet of Things using adaptive security. ICITST 2015: 362-368 - [c28]Pankaj Pandey, Einar Arthur Snekkenes:
Design and Performance Aspects of Information Security Prediction Markets for Risk Management. SECRYPT 2015: 273-284 - 2014
- [c27]Pankaj Pandey, Einar Arthur Snekkenes:
Applicability of Prediction Markets in Information Security Risk Management. DEXA Workshops 2014: 296-300 - [c26]Gaute Wangen, Einar Arthur Snekkenes:
A Comparison between Business Process Management and Information Security Management. FedCSIS 2014: 901-910 - [c25]Pankaj Pandey, Einar Arthur Snekkenes:
Using Prediction Markets to Hedge Information Security Risks. STM 2014: 129-145 - 2013
- [c24]Einar Snekkenes:
Position Paper: Privacy Risk Analysis Is about Understanding Conflicting Incentives. IDMAN 2013: 100-103 - [c23]Lisa Rajbhandari, Einar Snekkenes:
Using the Conflicting Incentives Risk Analysis Method. SEC 2013: 315-329 - [c22]Lisa Rajbhandari, Einar Snekkenes:
Risk Acceptance and Rejection for Threat and Opportunity Risks in Conflicting Incentives Risk Analysis. TrustBus 2013: 124-136 - 2012
- [j8]Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes:
Layout Dependent Phenomena A New Side-channel Power Model. J. Comput. 7(4): 827-837 (2012) - [c21]Lisa Rajbhandari, Einar Snekkenes:
Intended Actions: Risk Is Conflicting Incentives. ISC 2012: 370-386 - 2011
- [j7]Davrondzhon Gafurov, Patrick Bours, Einar Snekkenes:
User authentication based on foot motion. Signal Image Video Process. 5(4): 457-467 (2011) - [c20]Lisa Rajbhandari, Einar Snekkenes:
Mapping between Classical Risk Management and Game Theoretical Approaches. Communications and Multimedia Security 2011: 147-154 - [c19]Lisa Rajbhandari, Einar Snekkenes:
An approach to measure effectiveness of control for risk analysis with game theory. STAST 2011: 24-29 - 2010
- [c18]Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours:
Improved Gait Recognition Performance Using Cycle Matching. AINA Workshops 2010: 836-841 - [c17]Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes:
Security Implications of Crosstalk in Switching CMOS Gates. ISC 2010: 269-275 - [c16]Lisa Rajbhandari, Einar Snekkenes:
Using Game Theory to Analyze Risk to Privacy: An Initial Insight. PrimeLife 2010: 41-51
2000 – 2009
- 2009
- [j6]Davrondzhon Gafurov, Einar Snekkenes:
Gait Recognition Using Wearable Motion Recording Sensors. EURASIP J. Adv. Signal Process. 2009 (2009) - [j5]Kirsi Helkala, Einar Snekkenes:
Formalizing the ranking of authentication products. Inf. Manag. Comput. Secur. 17(1): 30-43 (2009) - [j4]Kirsi Helkala, Einar Snekkenes:
Password Generation and Search Space Reduction. J. Comput. 4(7): 663-669 (2009) - 2008
- [c15]Davrondzhon Gafurov, Einar Snekkenes:
Towards understanding the uniqueness of gait biometric. FG 2008: 1-8 - [c14]Freddy Andreassen, Einar Snekkenes:
Security and privacy awareness of home PC users in Norway. HAISA 2008: 56-68 - [c13]Kirsi Helkala, Einar Snekkenes:
A method for ranking authentication products. HAISA 2008: 80-93 - [c12]Davrondzhon Gafurov, Einar Snekkenes:
Arm Swing as a Weak Biometric for Unobtrusive User Authentication. IIH-MSP 2008: 1080-1087 - 2007
- [j3]Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours:
Spoof Attacks on Gait Authentication System. IEEE Trans. Inf. Forensics Secur. 2(3-2): 491-502 (2007) - [c11]Davrondzhon Gafurov, Einar Snekkenes, Patrick Bours:
Gait Authentication and Identification Using Wearable Accelerometer Sensor. AutoID 2007: 220-225 - 2006
- [c10]Marijana Kosmerlj, Tom Fladsrud, Erik Hjelmås, Einar Snekkenes:
Face Recognition Issues in a Border Control Environment. ICB 2006: 33-39 - [c9]Geir Olav Dyrkolbotn, Einar Snekkenes:
A Wireless Covert Channel on Smart Cards (Short Paper). ICICS 2006: 249-259 - [c8]Davrondzhon Gafurov, Einar Snekkenes, Tor Erik Buvarp:
Robustness of Biometric Gait Authentication Against Impersonation Attack. OTM Workshops (1) 2006: 479-488 - 2005
- [j2]Einar Snekkenes:
Preface to the special issue on ESORICS 2003. Int. J. Inf. Sec. 4(3): 133-134 (2005) - [c7]Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes:
Measuring Resistance to Social Engineering. ISPEC 2005: 132-143 - 2004
- [c6]Hanno Langweg, Einar Snekkenes:
A classification of malicious software attacks. IPCCC 2004: 827-832 - 2003
- [e1]Einar Snekkenes, Dieter Gollmann:
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings. Lecture Notes in Computer Science 2808, Springer 2003, ISBN 3-540-20300-1 [contents] - 2001
- [c5]Einar Snekkenes:
Concepts for personal location privacy policies. EC 2001: 48-57
1990 – 1999
- 1992
- [c4]Einar Snekkenes:
Roles in cryptographic protocols. S&P 1992: 105-119 - 1991
- [j1]Klaus Gaarder, Einar Snekkenes:
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol. J. Cryptol. 3(2): 81-98 (1991) - [c3]Einar Snekkenes:
Exploring the BAN Approach to Protocol Analysis. S&P 1991: 171-181 - 1990
- [c2]Klaus Gaarder, Einar Snekkenes:
On The Formal Analysis of PKCS Authentication Protocols. AUSCRYPT 1990: 106-121 - [c1]Einar Snekkenes:
Authentication in Open Systems. PSTV 1990: 311-324
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint