How the great firewall of china is blocking tor P Winter, S Lindskog USENIX-The Advanced Computing Systems Association, 2012 | 244 | 2012 |
Spoiled onions: Exposing malicious Tor exit relays P Winter, R Köwer, M Mulazzani, M Huber, S Schrittwieser, S Lindskog, ... Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014 | 113 | 2014 |
How china is blocking tor P Winter, S Lindskog arXiv preprint arXiv:1204.0447, 2012 | 46 | 2012 |
On the functional relation between security and dependability impairments E Jonsson, L Strömberg, S Lindskog Proceedings of the 1999 workshop on New security paradigms, 104-111, 1999 | 41 | 1999 |
Modeling and tuning security from a quality of service perspective S Lindskog Chalmers University of Technology, 2005 | 38 | 2005 |
Systematic literature review on usability of firewall configuration A Voronkov, LH Iwaya, LA Martucci, S Lindskog ACM Computing Surveys (CSUR) 50 (6), 1-35, 2017 | 37 | 2017 |
How much privilege does an app need? Investigating resource usage of android apps (short paper) N Momen, T Pulls, L Fritsch, S Lindskog 2017 15th Annual Conference on Privacy, Security and Trust (PST), 268-2685, 2017 | 25 | 2017 |
IT security research and education in synergy S Lindskog, U Lindqvist, E Jonsson Univ., 1999 | 21 | 1999 |
System Administrators Prefer Command Line Interfaces, Don’t They?: An Exploratory Study of Firewall Interfaces A Voronkov, L Martucci, S Lindskog 15th Symposium on Usable Privacy and Security, Santa Clara, CA. AUG 12-13 …, 2019 | 16 | 2019 |
Web Site Privacy with P3P H Lindskog, S Lindskog John Wiley & Sons, 2003 | 16 | 2003 |
Design and implementation of a tunable encryption service for networked applications S Lindskog, A Brunstrom Workshop of the 1st International Conference on Security and Privacy for …, 2005 | 15 | 2005 |
A content-independent scalable encryption model S Lindskog, J Strandbergh, M Hackman, E Jonsson Computational Science and Its Applications–ICCSA 2004: International …, 2004 | 14 | 2004 |
Adding security to QoS architectures S Lindskog, E Jonsson Perspectives on multimedia: Communication, media and information technology …, 2003 | 14 | 2003 |
Adding Security to Quality of Service Architectures S Lindskog, E Jonsson Proceedings of the SSGRR Conference, 2002 | 14 | 2002 |
Using guesswork as a measure for confidentiality of selectively encrypted messages R Lundin, S Lindskog, A Brunstrom, S Fischer-Hübner Quality of Protection: Security Measurements and Metrics, 173-184, 2006 | 13 | 2006 |
Risks and dangers of security extensions H Hedbom, S Lindskog, E Jonsson Proceedings of Security and Control of IT in Society-II (IFIP SCITS-II), 231-248, 2001 | 13 | 2001 |
A Comparison of the Security of Windows NT and UNIX H Hedbom, S Lindskog, S Axelsson, E Jonsson Högskolan i Karlstad, 1998 | 13 | 1998 |
Performance evaluation of IKEv2 authentication methods in next generation wireless networks Z Faigl, S Lindskog, A Brunstrom Security and Communication Networks 3 (1), 83-98, 2010 | 12 | 2010 |
An end-to-end security solution for SCTP S Lindskog, A Brunstrom 2008 Third International Conference on Availability, Reliability and …, 2008 | 11 | 2008 |
Providing tunable security services: An IEEE 802.11 i example S Lindskog, A Brunstrom, Z Faigl, K Tóth 2006 Securecomm and Workshops, 1-10, 2006 | 11 | 2006 |