Name
Affiliation
Papers
MATS NÄSLUND
Ericsson Res, Stockholm, Sweden
34
Collaborators
Citations 
PageRank 
75
141
21.58
Referers 
Referees 
References 
290
537
313
Search Limit
100537
Title
Citations
PageRank
Year
On Designing PUF-Based TRNGs with Known Answer Tests10.362018
A Security Architecture for 5G Networks.00.342018
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.00.342017
Protecting IMSI and User Privacy in 5G Networks00.342016
A high assurance virtualization platform for ARMv810.352016
Error-Correcting Message Authentication for 5G00.342016
SecourHealth: A Delay-Tolerant Security Framework for Mobile Health Data Collection60.782015
Classifying Security Threats in Cloud Networking.00.342015
A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy10.402015
CRC-Based Message Authentication for 5G Mobile Technology70.492015
A random access procedure based on tunable puzzles00.342015
Lightweight CRC-based Message Authentication.10.372015
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications.00.342015
Keyed logic BIST for Trojan detection in SoC50.442014
Secure and efficient LBIST for feedback shift register-based cryptographic systems30.442014
Energy-efficient message authentication for IEEE 802.15.4-based wireless sensor networks00.342014
Mobile health in emerging countries: A survey of research initiatives in Brazil.200.932013
A Framework for Authentication and Authorization Credentials in Cloud Computing30.412013
Survey and comparison of message authentication solutions on wireless sensor networks.00.342013
Privacy in machine-to-machine communications A state-of-the-art survey10.632012
A Taxonomy Model for Cloud Computing Services.00.342011
Phd - A Generic And Flexible Architecture For Iptv In Authorized Domains00.342009
Security for Context-Aware ad-hoc Networking Applications00.342008
The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking.30.452008
Multiple personal security domains20.442006
New Results on the Hardness of Diffie-Hellman Bits50.452004
On the Bit Security of NTRUEncrypt40.442003
Hidden Number Problem with the Trace and Bit Security of XTR and LUC140.732002
The Hidden Number Problem in Extension Fields and Its Applications30.412002
Complexity Bounds on General Hard-Core Predicates40.422001
The security of all RSA and discrete log bits151.191999
On Steiner Triple Systems And Perfect Codes10.371999
The Security of Individual RSA Bits386.551998
The Complexity of Computing Hard Core Predicates30.471997