default search action
BibTeX records: Geir M. Køien
@article{DBLP:journals/jmm/Koien24, author = {Geir M. K{\o}ien}, title = {The Road to a Trustworthy 6G; On the Need for a "Zero Trust 6G" Paradigm}, journal = {J. Mobile Multimedia}, volume = {20}, number = {1}, pages = {87--110}, year = {2024}, url = {https://doi.org/10.13052/jmm1550-4646.2014}, doi = {10.13052/JMM1550-4646.2014}, timestamp = {Sat, 17 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmm/Koien24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Koien21, author = {Geir M. K{\o}ien}, title = {A Threat Analysis of Human Bond Communications}, journal = {Wirel. Pers. Commun.}, volume = {118}, number = {3}, pages = {1987--2013}, year = {2021}, url = {https://doi.org/10.1007/s11277-019-06340-y}, doi = {10.1007/S11277-019-06340-Y}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Koien21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Koien21a, author = {Geir M. K{\o}ien}, title = {On Threats to the 5G Service Based Architecture}, journal = {Wirel. Pers. Commun.}, volume = {119}, number = {1}, pages = {97--116}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-08200-0}, doi = {10.1007/S11277-021-08200-0}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/Koien21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Koien21b, author = {Geir M. K{\o}ien}, title = {Zero-Trust Principles for Legacy Components}, journal = {Wirel. Pers. Commun.}, volume = {121}, number = {2}, pages = {1169--1186}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-09055-1}, doi = {10.1007/S11277-021-09055-1}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/Koien21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/Koien21, author = {Geir M. K{\o}ien}, editor = {Dylan D. Schmorrow and Cali M. Fidopiastis}, title = {Initial Reflections on the Use of Augmented Cognition in Derailing the Kill Chain}, booktitle = {Augmented Cognition - 15th International Conference, {AC} 2021, Held as Part of the 23rd {HCI} International Conference, {HCII} 2021, Virtual Event, July 24-29, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12776}, pages = {433--451}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78114-9\_30}, doi = {10.1007/978-3-030-78114-9\_30}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/Koien21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eicc/2021, editor = {Martin Gilje Jaatun and Geir M. K{\o}ien and Oksana Kulyk}, title = {{EICC} '21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487405}, doi = {10.1145/3487405}, isbn = {978-1-4503-9049-1}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eicc/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Koien20, author = {Geir M. K{\o}ien}, title = {A Philosophy of Security Architecture Design}, journal = {Wirel. Pers. Commun.}, volume = {113}, number = {3}, pages = {1615--1639}, year = {2020}, url = {https://doi.org/10.1007/s11277-020-07310-5}, doi = {10.1007/S11277-020-07310-5}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Koien20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Koien19, author = {Geir M. K{\o}ien}, title = {Why Cryptosystems Fail Revisited}, journal = {Wirel. Pers. Commun.}, volume = {106}, number = {1}, pages = {85--117}, year = {2019}, url = {https://doi.org/10.1007/s11277-019-06265-6}, doi = {10.1007/S11277-019-06265-6}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Koien19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/AbomharaSKG18, author = {Mohamed Abomhara and Berglind Smaradottir and Geir M. K{\o}ien and Martin Gerdes}, editor = {Reyer Zwiggelaar and Hugo Gamboa and Ana L. N. Fred and Sergi Berm{\'{u}}dez i Badia}, title = {Sharing With Care - Multidisciplinary Teams and Secure Access to Electronic Health Records}, booktitle = {Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies {(BIOSTEC} 2018) - Volume 5: HEALTHINF, Funchal, Madeira, Portugal, January 19-21, 2018}, pages = {379--386}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006562403790386}, doi = {10.5220/0006562403790386}, timestamp = {Mon, 26 Mar 2018 16:30:55 +0200}, biburl = {https://dblp.org/rec/conf/biostec/AbomharaSKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AbomharaKOH18, author = {Mohamed Abomhara and Geir M. K{\o}ien and Vladimir A. Oleshchuk and Mohamed Hamid}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Towards Risk-aware Access Control Framework for Healthcare Information Sharing}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {312--321}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006608103120321}, doi = {10.5220/0006608103120321}, timestamp = {Wed, 11 Apr 2018 15:27:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/AbomharaKOH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcis/FongenK18, author = {Anders Fongen and Geir M. K{\o}ien}, title = {Trust management in tactical coalition software defined networks}, booktitle = {International Conference on Military Communications and Information Systems, {ICMCIS} 2018, Warsaw, Poland, May 22-23, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICMCIS.2018.8398731}, doi = {10.1109/ICMCIS.2018.8398731}, timestamp = {Fri, 19 Apr 2024 13:06:13 +0200}, biburl = {https://dblp.org/rec/conf/icmcis/FongenK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhir/AbomharaYKL17, author = {Mohamed Abomhara and Huihui Yang and Geir M. K{\o}ien and Mehdi Ben Lazreg}, title = {Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification}, journal = {J. Heal. Informatics Res.}, volume = {1}, number = {1}, pages = {19--51}, year = {2017}, url = {https://doi.org/10.1007/s41666-017-0004-7}, doi = {10.1007/S41666-017-0004-7}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhir/AbomharaYKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Koien16, author = {Geir M. K{\o}ien}, title = {A privacy enhanced device access protocol for an IoT context}, journal = {Secur. Commun. Networks}, volume = {9}, number = {5}, pages = {440--450}, year = {2016}, url = {https://doi.org/10.1002/sec.880}, doi = {10.1002/SEC.880}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Koien16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/AbomharaK16, author = {Mohamed Abomhara and Geir M. K{\o}ien}, editor = {James P. Gilbert and Haim Azhari and Hesham H. Ali and Carla Quint{\~{a}}o and Jan Sliwa and Carolina Ruiz and Ana L. N. Fred and Hugo Gamboa}, title = {Towards an Access Control Model for Collaborative Healthcare Systems}, booktitle = {Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies {(BIOSTEC} 2016) - Volume 5: HEALTHINF, Rome, Italy, February 21-23, 2016}, pages = {213--222}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005659102130222}, doi = {10.5220/0005659102130222}, timestamp = {Sat, 21 Sep 2019 10:38:11 +0200}, biburl = {https://dblp.org/rec/conf/biostec/AbomharaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichi/AbomharaYK16, author = {Mohamed Abomhara and Huihui Yang and Geir M. K{\o}ien}, title = {Access Control Model for Cooperative Healthcare Environments: Modeling and Verification}, booktitle = {2016 {IEEE} International Conference on Healthcare Informatics, {ICHI} 2016, Chicago, IL, USA, October 4-7, 2016}, pages = {46--54}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICHI.2016.10}, doi = {10.1109/ICHI.2016.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ichi/AbomharaYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AbomharaK15, author = {Mohamed Abomhara and Geir M. K{\o}ien}, title = {Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {65--88}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.414}, doi = {10.13052/JCSM2245-1439.414}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbomharaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prisms/AbomharaK14, author = {Mohamed Abomhara and Geir M. K{\o}ien}, title = {Security and privacy in the Internet of Things: Current status and open issues}, booktitle = {2014 International Conference on Privacy and Security in Mobile Systems, {PRISMS} 2014, Aalborg, Denmark, May 11-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/PRISMS.2014.6970594}, doi = {10.1109/PRISMS.2014.6970594}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prisms/AbomharaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vitae/Koien14, author = {Geir M. K{\o}ien}, title = {A "Best Current Practice" for 3GPP-based cellular system security}, booktitle = {4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace {\&} Electronic Systems, {VITAE} 2014, Aalborg, Denmark, May 11-14, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/VITAE.2014.6934443}, doi = {10.1109/VITAE.2014.6934443}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/vitae/Koien14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JaatunTK13, author = {Martin Gilje Jaatun and Inger Anne T{\o}ndel and Geir M. K{\o}ien}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {{GPRS} Security for Smart Meters}, booktitle = {Availability, Reliability, and Security in Information Systems and {HCI} - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2013, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8127}, pages = {195--207}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40511-2\_14}, doi = {10.1007/978-3-642-40511-2\_14}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/JaatunTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/KoienO13, author = {Geir M. K{\o}ien and Vladimir A. Oleshchuk}, editor = {Fr{\'{e}}d{\'{e}}ric Desprez and Donald Ferguson and Ethan Hadar and Frank Leymann and Matthias Jarke and Markus Helfert}, title = {Addressing the Terms-of-Service Threat - Client-side Security and Policy Control for Free File Storage Services}, booktitle = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013}, pages = {562--569}, publisher = {SciTePress}, year = {2013}, timestamp = {Wed, 29 Mar 2017 16:45:24 +0200}, biburl = {https://dblp.org/rec/conf/closer/KoienO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indin/Ulltveit-MoeGAKO13, author = {Nils Ulltveit{-}Moe and Terje Gj{\o}s{\ae}ter and Sigurd M. Assev and Geir M. K{\o}ien and Vladimir A. Oleshchuk}, title = {Privacy handling for critical information infrastructures}, booktitle = {11th {IEEE} International Conference on Industrial Informatics, {INDIN} 2013, Bochum, Germany, July 29-31, 2013}, pages = {688--694}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INDIN.2013.6622967}, doi = {10.1109/INDIN.2013.6622967}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/indin/Ulltveit-MoeGAKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/Koien13, author = {Geir M. K{\o}ien}, title = {Privacy enhanced mutual authentication in {LTE}}, booktitle = {9th {IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, Lyon, France, October 7-9, 2013}, pages = {614--621}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WiMOB.2013.6673421}, doi = {10.1109/WIMOB.2013.6673421}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/Koien13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Koien12, author = {Geir M. K{\o}ien}, title = {Mobility and Spatio-Temporal Exposure Control Exposure Control as a Primary Security and Privacy Tool Regarding Mobility, Roaming Privacy and Home Control}, journal = {J. Cyber Secur. Mobil.}, volume = {1}, number = {4}, year = {2012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Koien12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Ulltveit-MoeOK11, author = {Nils Ulltveit{-}Moe and Vladimir A. Oleshchuk and Geir M. K{\o}ien}, title = {Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context}, journal = {Wirel. Pers. Commun.}, volume = {57}, number = {3}, pages = {317--338}, year = {2011}, url = {https://doi.org/10.1007/s11277-010-0069-6}, doi = {10.1007/S11277-010-0069-6}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Ulltveit-MoeOK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Koien11, author = {Geir M. K{\o}ien}, title = {Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context}, journal = {Wirel. Pers. Commun.}, volume = {61}, number = {3}, pages = {495--510}, year = {2011}, url = {https://doi.org/10.1007/s11277-011-0386-4}, doi = {10.1007/S11277-011-0386-4}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Koien11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/Koien11, author = {Geir M. K{\o}ien}, title = {Mutual entity authentication for {LTE}}, booktitle = {Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2011, Istanbul, Turkey, 4-8 July, 2011}, pages = {689--694}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IWCMC.2011.5982630}, doi = {10.1109/IWCMC.2011.5982630}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/Koien11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/Koien11, author = {Geir M. K{\o}ien}, editor = {Ramjee Prasad and K{\'{a}}roly Farkas and Andreas U. Schmidt and Antonio Lioy and Giovanni Russello and Flaminia L. Luccio}, title = {Privacy Enhanced Device Access}, booktitle = {Security and Privacy in Mobile Information and Communication Systems - Third International {ICST} Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {94}, pages = {76--87}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-30244-2\_7}, doi = {10.1007/978-3-642-30244-2\_7}, timestamp = {Fri, 27 Dec 2019 21:26:42 +0100}, biburl = {https://dblp.org/rec/conf/mobisec/Koien11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Koien07, author = {Geir M. K{\o}ien}, title = {Privacy Enhanced Mobile Authentication}, journal = {Wirel. Pers. Commun.}, volume = {40}, number = {3}, pages = {443--455}, year = {2007}, url = {https://doi.org/10.1007/s11277-006-9202-y}, doi = {10.1007/S11277-006-9202-Y}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Koien07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/KoienO05, author = {Geir M. K{\o}ien and Vladimir A. Oleshchuk}, editor = {George Danezis and David M. Martin Jr.}, title = {Location Privacy for Cellular Systems; Analysis and Solution}, booktitle = {Privacy Enhancing Technologies, 5th International Workshop, {PET} 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3856}, pages = {40--58}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11767831\_4}, doi = {10.1007/11767831\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/KoienO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/Koien05, author = {Geir M. K{\o}ien}, editor = {Markus Jakobsson and Radha Poovendran}, title = {Privacy enhanced cellular access security}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne, Germany, September 2, 2005}, pages = {57--66}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1080793.1080804}, doi = {10.1145/1080793.1080804}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/Koien05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/Koien04, author = {Geir M. K{\o}ien}, title = {An introduction to access security in {UMTS}}, journal = {{IEEE} Wirel. Commun.}, volume = {11}, number = {1}, pages = {8--18}, year = {2004}, url = {https://doi.org/10.1109/MWC.2004.1269712}, doi = {10.1109/MWC.2004.1269712}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/Koien04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/RoseK04, author = {Greg Rose and Geir M. K{\o}ien}, title = {Access security in CDMA2000, including a comparison with {UMTS} access security}, journal = {{IEEE} Wirel. Commun.}, volume = {11}, number = {1}, pages = {19--25}, year = {2004}, url = {https://doi.org/10.1109/MWC.2004.1269713}, doi = {10.1109/MWC.2004.1269713}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/RoseK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/KoienH03, author = {Geir M. K{\o}ien and Thomas Haslestad}, title = {Security aspects of 3G-WLAN interworking}, journal = {{IEEE} Commun. Mag.}, volume = {41}, number = {11}, pages = {82--88}, year = {2003}, url = {https://doi.org/10.1109/MCOM.2003.1244927}, doi = {10.1109/MCOM.2003.1244927}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/KoienH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/KoienO03, author = {Geir M. K{\o}ien and Vladimir A. Oleshchuk}, title = {Spatio-temporal exposure control}, booktitle = {Proceedings of the {IEEE} 14th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2003, 7-10 September 2003, Beijing, China}, pages = {2760--2764}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/PIMRC.2003.1259244}, doi = {10.1109/PIMRC.2003.1259244}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/KoienO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.