BibTeX records: Geir M. Køien

download as .bib file

@article{DBLP:journals/jmm/Koien24,
  author       = {Geir M. K{\o}ien},
  title        = {The Road to a Trustworthy 6G; On the Need for a "Zero Trust 6G"
                  Paradigm},
  journal      = {J. Mobile Multimedia},
  volume       = {20},
  number       = {1},
  pages        = {87--110},
  year         = {2024},
  url          = {https://doi.org/10.13052/jmm1550-4646.2014},
  doi          = {10.13052/JMM1550-4646.2014},
  timestamp    = {Sat, 17 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmm/Koien24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Koien21,
  author       = {Geir M. K{\o}ien},
  title        = {A Threat Analysis of Human Bond Communications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {118},
  number       = {3},
  pages        = {1987--2013},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-019-06340-y},
  doi          = {10.1007/S11277-019-06340-Y},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Koien21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Koien21a,
  author       = {Geir M. K{\o}ien},
  title        = {On Threats to the 5G Service Based Architecture},
  journal      = {Wirel. Pers. Commun.},
  volume       = {119},
  number       = {1},
  pages        = {97--116},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-08200-0},
  doi          = {10.1007/S11277-021-08200-0},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/Koien21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Koien21b,
  author       = {Geir M. K{\o}ien},
  title        = {Zero-Trust Principles for Legacy Components},
  journal      = {Wirel. Pers. Commun.},
  volume       = {121},
  number       = {2},
  pages        = {1169--1186},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-09055-1},
  doi          = {10.1007/S11277-021-09055-1},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/Koien21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/Koien21,
  author       = {Geir M. K{\o}ien},
  editor       = {Dylan D. Schmorrow and
                  Cali M. Fidopiastis},
  title        = {Initial Reflections on the Use of Augmented Cognition in Derailing
                  the Kill Chain},
  booktitle    = {Augmented Cognition - 15th International Conference, {AC} 2021, Held
                  as Part of the 23rd {HCI} International Conference, {HCII} 2021, Virtual
                  Event, July 24-29, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12776},
  pages        = {433--451},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78114-9\_30},
  doi          = {10.1007/978-3-030-78114-9\_30},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/Koien21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eicc/2021,
  editor       = {Martin Gilje Jaatun and
                  Geir M. K{\o}ien and
                  Oksana Kulyk},
  title        = {{EICC} '21: European Interdisciplinary Cybersecurity Conference, Virtual
                  Event, Romania, November 10-11, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3487405},
  doi          = {10.1145/3487405},
  isbn         = {978-1-4503-9049-1},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eicc/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Koien20,
  author       = {Geir M. K{\o}ien},
  title        = {A Philosophy of Security Architecture Design},
  journal      = {Wirel. Pers. Commun.},
  volume       = {113},
  number       = {3},
  pages        = {1615--1639},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11277-020-07310-5},
  doi          = {10.1007/S11277-020-07310-5},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Koien20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Koien19,
  author       = {Geir M. K{\o}ien},
  title        = {Why Cryptosystems Fail Revisited},
  journal      = {Wirel. Pers. Commun.},
  volume       = {106},
  number       = {1},
  pages        = {85--117},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11277-019-06265-6},
  doi          = {10.1007/S11277-019-06265-6},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Koien19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/AbomharaSKG18,
  author       = {Mohamed Abomhara and
                  Berglind Smaradottir and
                  Geir M. K{\o}ien and
                  Martin Gerdes},
  editor       = {Reyer Zwiggelaar and
                  Hugo Gamboa and
                  Ana L. N. Fred and
                  Sergi Berm{\'{u}}dez i Badia},
  title        = {Sharing With Care - Multidisciplinary Teams and Secure Access to Electronic
                  Health Records},
  booktitle    = {Proceedings of the 11th International Joint Conference on Biomedical
                  Engineering Systems and Technologies {(BIOSTEC} 2018) - Volume 5:
                  HEALTHINF, Funchal, Madeira, Portugal, January 19-21, 2018},
  pages        = {379--386},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006562403790386},
  doi          = {10.5220/0006562403790386},
  timestamp    = {Mon, 26 Mar 2018 16:30:55 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/AbomharaSKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AbomharaKOH18,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien and
                  Vladimir A. Oleshchuk and
                  Mohamed Hamid},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Towards Risk-aware Access Control Framework for Healthcare Information
                  Sharing},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {312--321},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006608103120321},
  doi          = {10.5220/0006608103120321},
  timestamp    = {Wed, 11 Apr 2018 15:27:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/AbomharaKOH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcis/FongenK18,
  author       = {Anders Fongen and
                  Geir M. K{\o}ien},
  title        = {Trust management in tactical coalition software defined networks},
  booktitle    = {International Conference on Military Communications and Information
                  Systems, {ICMCIS} 2018, Warsaw, Poland, May 22-23, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICMCIS.2018.8398731},
  doi          = {10.1109/ICMCIS.2018.8398731},
  timestamp    = {Fri, 19 Apr 2024 13:06:13 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcis/FongenK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhir/AbomharaYKL17,
  author       = {Mohamed Abomhara and
                  Huihui Yang and
                  Geir M. K{\o}ien and
                  Mehdi Ben Lazreg},
  title        = {Work-Based Access Control Model for Cooperative Healthcare Environments:
                  Formal Specification and Verification},
  journal      = {J. Heal. Informatics Res.},
  volume       = {1},
  number       = {1},
  pages        = {19--51},
  year         = {2017},
  url          = {https://doi.org/10.1007/s41666-017-0004-7},
  doi          = {10.1007/S41666-017-0004-7},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhir/AbomharaYKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Koien16,
  author       = {Geir M. K{\o}ien},
  title        = {A privacy enhanced device access protocol for an IoT context},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {5},
  pages        = {440--450},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.880},
  doi          = {10.1002/SEC.880},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Koien16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/AbomharaK16,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien},
  editor       = {James P. Gilbert and
                  Haim Azhari and
                  Hesham H. Ali and
                  Carla Quint{\~{a}}o and
                  Jan Sliwa and
                  Carolina Ruiz and
                  Ana L. N. Fred and
                  Hugo Gamboa},
  title        = {Towards an Access Control Model for Collaborative Healthcare Systems},
  booktitle    = {Proceedings of the 9th International Joint Conference on Biomedical
                  Engineering Systems and Technologies {(BIOSTEC} 2016) - Volume 5:
                  HEALTHINF, Rome, Italy, February 21-23, 2016},
  pages        = {213--222},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005659102130222},
  doi          = {10.5220/0005659102130222},
  timestamp    = {Sat, 21 Sep 2019 10:38:11 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/AbomharaK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichi/AbomharaYK16,
  author       = {Mohamed Abomhara and
                  Huihui Yang and
                  Geir M. K{\o}ien},
  title        = {Access Control Model for Cooperative Healthcare Environments: Modeling
                  and Verification},
  booktitle    = {2016 {IEEE} International Conference on Healthcare Informatics, {ICHI}
                  2016, Chicago, IL, USA, October 4-7, 2016},
  pages        = {46--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICHI.2016.10},
  doi          = {10.1109/ICHI.2016.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ichi/AbomharaYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AbomharaK15,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien},
  title        = {Cyber Security and the Internet of Things: Vulnerabilities, Threats,
                  Intruders and Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {65--88},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.414},
  doi          = {10.13052/JCSM2245-1439.414},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbomharaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prisms/AbomharaK14,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien},
  title        = {Security and privacy in the Internet of Things: Current status and
                  open issues},
  booktitle    = {2014 International Conference on Privacy and Security in Mobile Systems,
                  {PRISMS} 2014, Aalborg, Denmark, May 11-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/PRISMS.2014.6970594},
  doi          = {10.1109/PRISMS.2014.6970594},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prisms/AbomharaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vitae/Koien14,
  author       = {Geir M. K{\o}ien},
  title        = {A "Best Current Practice" for 3GPP-based cellular system
                  security},
  booktitle    = {4th International Conference on Wireless Communications, Vehicular
                  Technology, Information Theory and Aerospace {\&} Electronic Systems,
                  {VITAE} 2014, Aalborg, Denmark, May 11-14, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/VITAE.2014.6934443},
  doi          = {10.1109/VITAE.2014.6934443},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/vitae/Koien14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JaatunTK13,
  author       = {Martin Gilje Jaatun and
                  Inger Anne T{\o}ndel and
                  Geir M. K{\o}ien},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {{GPRS} Security for Smart Meters},
  booktitle    = {Availability, Reliability, and Security in Information Systems and
                  {HCI} - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference,
                  {CD-ARES} 2013, Regensburg, Germany, September 2-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8127},
  pages        = {195--207},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40511-2\_14},
  doi          = {10.1007/978-3-642-40511-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JaatunTK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/KoienO13,
  author       = {Geir M. K{\o}ien and
                  Vladimir A. Oleshchuk},
  editor       = {Fr{\'{e}}d{\'{e}}ric Desprez and
                  Donald Ferguson and
                  Ethan Hadar and
                  Frank Leymann and
                  Matthias Jarke and
                  Markus Helfert},
  title        = {Addressing the Terms-of-Service Threat - Client-side Security and
                  Policy Control for Free File Storage Services},
  booktitle    = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on
                  Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013},
  pages        = {562--569},
  publisher    = {SciTePress},
  year         = {2013},
  timestamp    = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/KoienO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indin/Ulltveit-MoeGAKO13,
  author       = {Nils Ulltveit{-}Moe and
                  Terje Gj{\o}s{\ae}ter and
                  Sigurd M. Assev and
                  Geir M. K{\o}ien and
                  Vladimir A. Oleshchuk},
  title        = {Privacy handling for critical information infrastructures},
  booktitle    = {11th {IEEE} International Conference on Industrial Informatics, {INDIN}
                  2013, Bochum, Germany, July 29-31, 2013},
  pages        = {688--694},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INDIN.2013.6622967},
  doi          = {10.1109/INDIN.2013.6622967},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/indin/Ulltveit-MoeGAKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/Koien13,
  author       = {Geir M. K{\o}ien},
  title        = {Privacy enhanced mutual authentication in {LTE}},
  booktitle    = {9th {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2013, Lyon, France, October 7-9,
                  2013},
  pages        = {614--621},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WiMOB.2013.6673421},
  doi          = {10.1109/WIMOB.2013.6673421},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/Koien13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Koien12,
  author       = {Geir M. K{\o}ien},
  title        = {Mobility and Spatio-Temporal Exposure Control Exposure Control as
                  a Primary Security and Privacy Tool Regarding Mobility, Roaming Privacy
                  and Home Control},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {1},
  number       = {4},
  year         = {2012},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Koien12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Ulltveit-MoeOK11,
  author       = {Nils Ulltveit{-}Moe and
                  Vladimir A. Oleshchuk and
                  Geir M. K{\o}ien},
  title        = {Location-Aware Mobile Intrusion Detection with Enhanced Privacy in
                  a 5G Context},
  journal      = {Wirel. Pers. Commun.},
  volume       = {57},
  number       = {3},
  pages        = {317--338},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-010-0069-6},
  doi          = {10.1007/S11277-010-0069-6},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Ulltveit-MoeOK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Koien11,
  author       = {Geir M. K{\o}ien},
  title        = {Reflections on Trust in Devices: An Informal Survey of Human Trust
                  in an Internet-of-Things Context},
  journal      = {Wirel. Pers. Commun.},
  volume       = {61},
  number       = {3},
  pages        = {495--510},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-011-0386-4},
  doi          = {10.1007/S11277-011-0386-4},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Koien11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/Koien11,
  author       = {Geir M. K{\o}ien},
  title        = {Mutual entity authentication for {LTE}},
  booktitle    = {Proceedings of the 7th International Wireless Communications and Mobile
                  Computing Conference, {IWCMC} 2011, Istanbul, Turkey, 4-8 July, 2011},
  pages        = {689--694},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IWCMC.2011.5982630},
  doi          = {10.1109/IWCMC.2011.5982630},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/Koien11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/Koien11,
  author       = {Geir M. K{\o}ien},
  editor       = {Ramjee Prasad and
                  K{\'{a}}roly Farkas and
                  Andreas U. Schmidt and
                  Antonio Lioy and
                  Giovanni Russello and
                  Flaminia L. Luccio},
  title        = {Privacy Enhanced Device Access},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems
                  - Third International {ICST} Conference, MobiSec 2011, Aalborg, Denmark,
                  May 17-19, 2011, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {94},
  pages        = {76--87},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-30244-2\_7},
  doi          = {10.1007/978-3-642-30244-2\_7},
  timestamp    = {Fri, 27 Dec 2019 21:26:42 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec/Koien11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Koien07,
  author       = {Geir M. K{\o}ien},
  title        = {Privacy Enhanced Mobile Authentication},
  journal      = {Wirel. Pers. Commun.},
  volume       = {40},
  number       = {3},
  pages        = {443--455},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11277-006-9202-y},
  doi          = {10.1007/S11277-006-9202-Y},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Koien07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/KoienO05,
  author       = {Geir M. K{\o}ien and
                  Vladimir A. Oleshchuk},
  editor       = {George Danezis and
                  David M. Martin Jr.},
  title        = {Location Privacy for Cellular Systems; Analysis and Solution},
  booktitle    = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
                  2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3856},
  pages        = {40--58},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11767831\_4},
  doi          = {10.1007/11767831\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/KoienO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/Koien05,
  author       = {Geir M. K{\o}ien},
  editor       = {Markus Jakobsson and
                  Radha Poovendran},
  title        = {Privacy enhanced cellular access security},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne,
                  Germany, September 2, 2005},
  pages        = {57--66},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1080793.1080804},
  doi          = {10.1145/1080793.1080804},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/Koien05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/Koien04,
  author       = {Geir M. K{\o}ien},
  title        = {An introduction to access security in {UMTS}},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {11},
  number       = {1},
  pages        = {8--18},
  year         = {2004},
  url          = {https://doi.org/10.1109/MWC.2004.1269712},
  doi          = {10.1109/MWC.2004.1269712},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/Koien04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/RoseK04,
  author       = {Greg Rose and
                  Geir M. K{\o}ien},
  title        = {Access security in CDMA2000, including a comparison with {UMTS} access
                  security},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {11},
  number       = {1},
  pages        = {19--25},
  year         = {2004},
  url          = {https://doi.org/10.1109/MWC.2004.1269713},
  doi          = {10.1109/MWC.2004.1269713},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/RoseK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/KoienH03,
  author       = {Geir M. K{\o}ien and
                  Thomas Haslestad},
  title        = {Security aspects of 3G-WLAN interworking},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {41},
  number       = {11},
  pages        = {82--88},
  year         = {2003},
  url          = {https://doi.org/10.1109/MCOM.2003.1244927},
  doi          = {10.1109/MCOM.2003.1244927},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/KoienH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/KoienO03,
  author       = {Geir M. K{\o}ien and
                  Vladimir A. Oleshchuk},
  title        = {Spatio-temporal exposure control},
  booktitle    = {Proceedings of the {IEEE} 14th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2003, 7-10 September
                  2003, Beijing, China},
  pages        = {2760--2764},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/PIMRC.2003.1259244},
  doi          = {10.1109/PIMRC.2003.1259244},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/KoienO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}