Stefan Lindskog
Stefan Lindskog
SINTEF Digital, Norway & Karlstad University, Sweden
Verified email at kau.se - Homepage
Title
Cited by
Cited by
Year
How the great firewall of china is blocking tor
P Winter, S Lindskog
USENIX-The Advanced Computing Systems Association, 2012
2202012
Spoiled onions: Exposing malicious Tor exit relays
P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ...
International Symposium on Privacy Enhancing Technologies Symposium, 304-331, 2014
1062014
How china is blocking tor
P Winter, S Lindskog
arXiv preprint arXiv:1204.0447, 2012
412012
On the functional relation between security and dependability impairments
E Jonsson, L Strömberg, S Lindskog
Proceedings of the 1999 workshop on New security paradigms, 104-111, 1999
411999
Modeling and tuning security from a quality of service perspective
S Lindskog
Chalmers University of Technology, 2005
372005
Systematic literature review on usability of firewall configuration
A Voronkov, LH Iwaya, LA Martucci, S Lindskog
ACM Computing Surveys (CSUR) 50 (6), 1-35, 2017
262017
How much privilege does an app need? investigating resource usage of android apps (short paper)
N Momen, T Pulls, L Fritsch, S Lindskog
2017 15th Annual Conference on Privacy, Security and Trust (PST), 268-2685, 2017
242017
IT security research and education in synergy
S Lindskog, U Lindqvist, E Jonsson
Univ., 1999
211999
Design and implementation of a tunable encryption service for networked applications
S Lindskog, A Brunstrom
Workshop of the 1st International Conference on Security and Privacy for …, 2005
172005
Using guesswork as a measure for confidentiality of selectively encrypted messages
R Lundin, S Lindskog, A Brunstrom, S Fischer-Hübner
Quality of Protection, 173-184, 2006
152006
Web site privacy with P3P
H Lindskog, S Lindskog
John Wiley & Sons, 2003
152003
Adding security to QoS architectures
S Lindskog, E Jonsson
Perspectives on multimedia: Communication, media and information technology …, 2003
152003
A content-independent scalable encryption model
S Lindskog, J Strandbergh, M Hackman, E Jonsson
International Conference on Computational Science and Its Applications, 821-830, 2004
142004
Adding Security to Quality of Service Architectures
S Lindskog, E Jonsson
Proceedings of the SSGRR Conference, 2002
142002
A Comparison of the Security of Windows NT and UNIX
H Hedbom, S Lindskog, S Axelsson, E Jonsson
Högskolan i Karlstad, 1998
141998
Providing tunable security services: An IEEE 802.11 i example
S Lindskog, A Brunstrom, Z Faigl, K Tóth
2006 Securecomm and Workshops, 1-10, 2006
132006
Risks and dangers of security extensions
H Hedbom, S Lindskog, E Jonsson
Proceedings of Security and Control of IT in Society-II (IFIP SCITS-II), 231-248, 2001
132001
Performance evaluation of IKEv2 authentication methods in next generation wireless networks
Z Faigl, S Lindskog, A Brunstrom
Security and Communication Networks 3 (1), 83-98, 2010
122010
An end-to-end security solution for SCTP
S Lindskog, A Brunstrom
2008 Third International Conference on Availability, Reliability and …, 2008
112008
Using system call information to reveal hidden attack manifestations
UE Larson, DK Nilsson, E Jonsson, S Lindskog
2009 Proceedings of the 1st International Workshop on Security and …, 2009
102009
The system can't perform the operation now. Try again later.
Articles 1–20