Journal Papers
K. J. Hole and L.-H. Netland, “Toward Risk Assessment of Large-Impact and Rare Events,” IEEE Security & Privacy, May/June 2010. (Copyright notice at bottom of page.)
K. J. Hole, A. N. Klingsheim, L.-H. Netland, Y. Espelid, T. Tjøstheim, and V. Moen, “Risk Assessment of a National Security Infrastructure,” IEEE Security & Privacy, January/February 2009. (Copyright notice at bottom of page.)
K. J. Hole, L.-H. Netland, Y. Espelid, A. N. Klingsheim, H. Helleseth, and J. B. Henriksen, “Open Wireless Networks on University Campuses,” IEEE Security & Privacy, July/August 2008. (Copyright notice at bottom of page.)
A. Gjendemsjø, G. Øien, H. Holm, M.-S. Alouini, D. Gesbert, K. J. Hole, and P. Orten, “Rate and Power Allocation for Discrete-Rate Link Adaptation,” EURASIP Journal on Wireless Communications and Networking, 2008.
K. J. Hole, V. Moen, A. N. Klingsheim, and K. M. Tande, “Lessons from the Norwegian ATM System,” IEEE Security & Privacy, November/December 2007. (Copyright notice at bottom of page.)
V. Moen, A. N. Klingsheim, K. I. F. Simonsen, and K. J. Hole, “Vulnerabilities in E-Governments,” in Proc. 2nd International Conference on Global E-Security (ICGeS-06), London, England, April 20-22, 2006. The paper is also printed in International Journal of Electronic Security and Digital Forensics, Vol. 1, No. 1, 2007.
A. N. Klingsheim, V. Moen, and K. J. Hole, “Challenges in Securing Networked J2ME Applications,” IEEE Computer, February 2007. (Copyright notice at bottom of page.)
K. J. Hole, V. Moen, and T. Tjøstheim, “Case Study: Online Banking Security,” IEEE Security & Privacy, March/April 2006. (Copyright notice at bottom of page.)
D. V. Duong, G. E. Øien, and K. J. Hole, “Adaptive Coded Modulation with Receive Antenna Diversity and Imperfect Channel Knowledge at Receiver and Transmitter,” IEEE Transactions on Vehicular Technology, March 2006.
K. J. Hole, E. Dyrnes, and P. Thorsheim, “Securing Wi-Fi Networks,” IEEE Computer, July 2005. (Copyright notice at bottom of page.)
G. E. Øien, H. Holm, and K. J. Hole, “Impact of Channel Prediction on Adaptive Coded Modulation Performance in Rayleigh Fading,” IEEE Transactions on Vehicular Technology, May 2004.
V. Moen, H. Raddum, and K. J. Hole, “Weaknesses in the Temporal Key Hash of WPA,” Mobile Computing and Communications Review, April 2004.
Conference Papers
H. Raddum, L. H. Nestås, and K. J. Hole, “Security Analysis of Mobile Phones Used as OTP Generators,” in Proc. Workshop in Information Security Theory and Practices (WISTP 10), Passau, Germany, April 12-14, 2010 (see full report for additional figures and analysis).
Y. Espelid, L.-H. Netland, A. N. Klingsheim, and K. J. Hole, “Robbing Banks with Their Own software—an Exploit against Norwegian Online Banks,” in Proc. 23rd International Information Security Conference (SEC 2008), Milan, Italy, September 8-10, 2008.
Y. Espelid, L.-H. Netland, A. N. Klingsheim, and K. J. Hole, “A Proof of Concept Attack against Norwegian Internet Banking Systems,” in Proc. 12th International Conference on Financial Cryptography and Data Security (FC08), Cozumel, Mexico, January 28-31, 2008 (Lecture Notes in Computer Science, Springer).
A. N. Klingsheim and K. J. Hole, “Identity Theft: Much too Easy? A study of Online Systems in Norway,” in Proc. 12th International Conference on Financial Cryptography and Data Security (FC08), Cozumel, Mexico, January 28-31, 2008 (Lecture Notes in Computer Science, Springer).
T. Tjøstheim, T. Peacock, and P. Y. A. Ryan, “A Case Study in System-Based Analysis: The ThreeBallot Voting System and Pret a Voter,” presented at VoComp, Portland, USA, July16-18, 2007.
T. Tjøstheim, T. Peacock, and P. Y. A. Ryan, “A Model for System-Based Analysis of Voting Systems,” presented at the Fifteenth International Workshop on Security Protocols, Brno, Czech republic, 18-20 April 2007.
L.-H. Netland, Y. Espelid, and K. Mughal, “A Reflection-Based Framework for Content Validation,” in Proc. International Symposium on Frontiers in Availability, Reliability, and Security (FARES 07), Wien, Austria, April 10-13, 2007.
L.-H. Netland, Y. Espelid, and K. Mughal, “Security Pattern for Input Validation,” in Proc. VikingPLoP (Pattern Languages of Programs), Helsingør, Denmark, Sept. 28 – Oct. 1, 2006.
T. Tjøstheim and G. Røsland, “Remote Electronic Voting Using Verifiable Chain Encryption,” presented at the Frontiers in Electronic Elections (FEE2) workshop in conjuction with the 11th European Symposium on Research in Computer Security (ESORICS), Hamburg, Germany, Sept. 19, 2006.
Y. Espelid, L-H. Netland, K. Mughal, and K. J. Hole, “Simplifying Client-Server Application Development with Secure Reusable Components,” in Proc. International Symposium on Secure Software Engineering (ISSSE 06), Washington, USA, March 13-15, 2006.
T. Tjøstheim and V. Moen, “Vulnerabilities in Online Banks,” in Proc. 10th Nordic Workshop on Secure IT-systems (NordSec 2005), Tartu, Estonia, October 20-21, 2005, pp. 63-70.
K. I. F. Simonsen, V. Moen, and K. J. Hole, “Attack on Sun’s MIDP Reference Implementation of SSL,” in Proc. 10th Nordic Workshop on Secure IT-systems (NordSec 2005), Tartu, Estonia, October 20-21, 2005, pp. 96-103.
D. V. Duong, G. E. Øien, and K. J. Hole, “Adaptive Coded Modulation with Receive Antenna Diversity and Imperfect Channel Knowledge at Receiver and Transmitter,” in Proc. 13th European Signal Processing Conference (EUSIPCO2005), Turkey, Antalya, September 4-8, 2005.
O. Jetlund, G. E. Øien, K. J. Hole, and H. Holm, “Spectral Efficiency Bounds for Adaptive Coded Modulation with Outage Probability Constraints and Imperfect Channel Prediction,” in Proc. Nordic Radio Symposium 2004, Oulu, Finland, August 16-18, 2004.
© 2005-2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Last updated 04.08.11. Webmaster KJH