{"id":111,"date":"2008-08-10T12:53:18","date_gmt":"2008-08-10T10:53:18","guid":{"rendered":"http:\/\/www.carceri.dk\/blog\/?page_id=111"},"modified":"2012-10-19T09:06:35","modified_gmt":"2012-10-19T07:06:35","slug":"publikationer","status":"publish","type":"page","link":"https:\/\/www.bytopia.dk\/blog\/publikationer\/","title":{"rendered":"Publikationer"},"content":{"rendered":"<p>Her er de artikler og lignende, som jeg har produceret, eller v\u00e6ret medvirkende til, indtil videre. Siden er p\u00e5 engelsk, da de fleste af artiklerne alligevel er p\u00e5 engelsk, og det vil heller ikke give meget mening at pr\u00f8ve at overs\u00e6tte titlerne.<\/p>\n<h3>Peer Reviewed Conference Papers<\/h3>\n<p style=\"padding-left: 30px;\"><em><em>J. Camenisch, S. Hohenberger, M. \u00d8. Pedersen<\/em>\u00a0(2012)<\/em><br \/>\n<strong>Batch Verification of Short Signatures<\/strong><br \/>\nJournal of Cryptology: Volume 25, Issue 4 (2012), Page 723-747. Springer Verlag. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2012\/09\/chp-joc.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>A. L. Ferrara, M. Green, S. Hohenberger, M. \u00d8. Pedersen (2009)<\/em><br \/>\n<strong>Practical Short Signature Batch Verification<\/strong><br \/>\nM. Fischlin, editors, Proceedings of CT-RSA 2009: volume 5473 of Lecture Notes in Computer Science, pages 309-324, San Francisco, CA, USA, April 2009. Springer Verlag. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/09\/practical.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>I. Damg\u00e5rd, M. \u00d8. Pedersen (2008)<\/em><br \/>\n<strong>RFID Security -- Tradeoffs between Security and Efficiency<\/strong><br \/>\nTal Malkin, editors, Proceedings of CT-RSA 2008: volume 4964 of Lecture Notes in Computer Science, pages 318-332, San Francisco, CA, USA, April 2008. Springer Verlag. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/rfid.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>J. Camenisch, S. Hohenberger, M. \u00d8. Pedersen (2007)<\/em><br \/>\n<strong>Batch Verification of Short Signatures<\/strong><br \/>\nM. Naor, editors, Proceedings of Eurocrypt 2007: volume 4515 of Lecture Notes in Computer Science, pages 246-263, Barcelona, Spain, May 2007. Springer Verlag. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/batch.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>J. Pagter, M. \u00d8. Pedersen (2007)<\/em><br \/>\n<strong>The All-or-Nothing Anti-Theft Policy -- Theft Protection for Pervasive Computing<\/strong><br \/>\n21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, pages 626-631, May 21-23, 2007, Niagara Falls, Canada. IEEE Computer Society 2007. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/allornothing.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>I. Damg\u00e5rd, K. Dupont, M. \u00d8. Pedersen (2006)<\/em><br \/>\n<strong>Unclonable Group Identification<\/strong><br \/>\nS. Vaudenay, editors, Proceedings of Eurocrypt 2006: volume 4004 of Lecture Notes in Computer Science, pages 555-572, St. Petersburg, Russia, May\/June 2006. Springer Verlag. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/groupid.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>K. M. Hansen, S. B. Larsen, J. I. Pagter, M. \u00d8. Pedersen, J. Thomsen (2004)<\/em><br \/>\n<strong>An evaluation of a residential pervasive computing platform based on OSGi<\/strong><br \/>\nProceedings of the IADIS Applied Computing Conference, pp. I-246 to I-253, Lisbon, Portugal, 2004. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/osgieval.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>J. E. Bardram, R. E. Kj\u00e6r, M. \u00d8. Pedersen (2003)<\/em><br \/>\n<strong>Context-Aware User Authentication -- Supporting Proximity-Based Login in Pervasive Computing<\/strong><br \/>\nIn A. Dey, J. McCarthy, and A. Schmidt, editors, Proceedings of Ubicomp 2003: Ubiquitous Computing, volume 2864 of Lecture Notes in Computer Science, pages 107-123, Seattle, Washington, USA, Oct. 2003. Springer Verlag. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/ubicomp2003-cua.pdf\">.pdf<\/a>]<\/p>\n<h3>Other Work<\/h3>\n<p style=\"padding-left: 30px;\"><em>M. \u00d8. Pedersen (2008)<\/em><br \/>\n<strong>Authentication and Privacy with Application to Pervasive Computing<\/strong><br \/>\nPhD Dissertation, University of Aarhus -- Department of Computer Science. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/09\/dissertation.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>R. K. Jacobsen, I. Leisner, F. Nelsson (2006)<\/em><br \/>\n<strong>RFID fra product til forbrug<\/strong><br \/>\nReport from the Danish Board of Technology based on a project which, besides the authors, were guided by an expert group consisting of A. H\u00f8yrup, H. Mortensen, M. \u00d8. Pedersen, and C. W. Tougaard. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/p04_rfid.pdf\">.pdf<\/a>] (dk)<\/p>\n<p style=\"padding-left: 30px;\"><em>M. \u00d8. Pedersen (2005)<\/em><br \/>\n<strong>Security in Pervasive Computing and Protocols for Protecting Privacy<\/strong><br \/>\nProgress Report, University of Aarhus -- Department of Computer Science. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/progress_report.pdf\">.pdf<\/a>]<\/p>\n<p style=\"padding-left: 30px;\"><em>J. I. Pagter, M. \u00d8. Pedersen, T. P. Pedersen (2004)<\/em><br \/>\n<strong>Pervasive Computing -- IT Security and Privacy<\/strong><br \/>\nTechnical report ordered by The Danish Council for IT Security. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/rfits-uk.pdf\">.pdf<\/a>] (uk) [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/rfits.pdf\">.pdf<\/a>] (dk)<\/p>\n<p style=\"padding-left: 30px;\"><em>K. M. Hansen, S. B. Larsen, J. I. Pagter, M. \u00d8. Pedersen, J. Thomsen (2003)<\/em><br \/>\n<strong>Pervasive Scenario Evaluations: A multiperspective approach for evaluating emerging pervasive computing technologies<\/strong><br \/>\nTechnical report, ISIS Katrinebjerg. [<a href=\"http:\/\/www.bytopia.dk\/blog\/wp-content\/uploads\/2008\/08\/pse.pdf\">.pdf<\/a>]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Her er de artikler og lignende, som jeg har produceret, eller v\u00e6ret medvirkende til, indtil videre. Siden er p\u00e5 engelsk, da de fleste af artiklerne alligevel er p\u00e5 engelsk, og det vil heller ikke give meget mening at pr\u00f8ve at overs\u00e6tte titlerne. Peer Reviewed Conference Papers J. Camenisch, S. Hohenberger, M. \u00d8. Pedersen\u00a0(2012) Batch Verification [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-111","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.bytopia.dk\/blog\/wp-json\/wp\/v2\/pages\/111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bytopia.dk\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bytopia.dk\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bytopia.dk\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bytopia.dk\/blog\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":11,"href":"https:\/\/www.bytopia.dk\/blog\/wp-json\/wp\/v2\/pages\/111\/revisions"}],"predecessor-version":[{"id":1215,"href":"https:\/\/www.bytopia.dk\/blog\/wp-json\/wp\/v2\/pages\/111\/revisions\/1215"}],"wp:attachment":[{"href":"https:\/\/www.bytopia.dk\/blog\/wp-json\/wp\/v2\/media?parent=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}