default search action
Ivar Jørstad
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c32]Do Van Thanh, Ivar Jørstad, Do van Thuan:
Strong Authentication for Web Services with Mobile Universal Identity. MobiWIS 2015: 27-36 - 2013
- [c31]Do Van Thanh, Tore E. Jønvik, Ivar Jørstad, Do van Thuan:
Better User Protection with Mobile Identity. ICITCS 2013: 1-4 - 2010
- [c30]Nor Shahniza Kamal Bashah, Ivar Jørstad, Do Van Thanh:
Service Discovery in Future Open Mobile Environments. ICDS 2010: 47-53 - [c29]Nor Shahniza Kamal Bashah, Ivar Jørstad, Do Van Thanh:
An Open and Extensible Service Discovery for Ubiquitous Communication Systems. EUNICE 2010: 272-273 - [c28]Nor Shahniza Kamal Bashah, Atif Bhatti, Imran Aslam Choudhary, Ivar Jørstad, Do Van Thanh:
Service Discovery for mobile multi-domain multilanguage environments. WiMob 2010: 675-682
2000 – 2009
- 2009
- [c27]Charlott Eliasson, Markus Fiedler, Ivar Jørstad:
A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. ARES 2009: 865-869 - [c26]Nor Shahniza Kamal Bashah, Ivar Jørstad, Do Van Thanh:
Service Naming in Future Mobile Environments. ICPP Workshops 2009: 256-261 - [c25]Do Van Thanh, Ivar Jørstad, Tore E. Jønvik, Do van Thuan:
Strong authentication with mobile phone as security token. MASS 2009: 777-782 - [c24]Do Van Thanh, Ivar Jørstad, Tor Anders Johansen, Elias Bakken, Do van Thuan:
Pervasive Service Access with SIM-based VPN. MASS 2009: 836-841 - [c23]Karsten Peder Holth, Do van Thuan, Ivar Jørstad, Do Van Thanh:
An Analysis of Widget Security. NordSec 2009: 60-71 - 2008
- [c22]Do Van Thanh, Tore E. Jønvik, Boning Feng, Do van Thuan, Ivar Jørstad:
Simple Strong Authentication for Internet Applications Using Mobile Phones. GLOBECOM 2008: 1642-1646 - [c21]Thao Thanh Nguyen, Ivar Jørstad, Do Van Thanh:
Security and Performance of Mobile XML Web Services. ICNS 2008: 261-265 - [c20]Do Van Thanh, Paal E. Engelstad, Tore E. Jønvik, Do van Thuan, Ivar Jørstad:
Towards a Uniform IMS Client on Heterogeneous Devices. WiMob 2008: 196-201 - [c19]Do Van Thanh, Ivar Jørstad, Paal E. Engelstad, Tore E. Jønvik, Boning Feng, Do van Thuan:
Authentication in a Multi-access IMS Environment. WiMob 2008: 613-618 - [c18]Ivar Jørstad, Elias Bakken, Tor Anders Johansen:
Performance Evaluation of JSON and XML for Data Exchange in Mobile Services. WINSYS 2008: 237-240 - 2007
- [j2]Ivar Jørstad, Do Van Thanh:
Personalised ubiquitous file access with XML Web Services. Comput. Networks 51(16): 4655-4668 (2007) - [c17]Steffen Hallsteinsen, Ivar Jørstad, Do Van Thanh:
Using the mobile phone as a security token for unified authentication. ICSNC 2007: 68 - [c16]Ivar Jørstad, Do Van Thanh:
A Framework and Tool for Personalisation of Mobile Services Using Semantic Web. MDM 2007: 402-406 - [c15]Torstein Bjørnstad, Ivar Jørstad, Do Van Thanh:
Securing Virtual Private Networks with SIM Authentication. WiMob 2007: 27 - [c14]Frode Sivertsen, Ivar Jørstad, Do Van Thanh:
Linux Mobile - A Platform for Advanced Future Mobile Services. WINSYS 2007: 246-253 - 2006
- [c13]Ivar Jørstad, Do Van Thanh:
Service Personalisation in Mobile Heterogeneous Environments. AICT/ICIW 2006: 70 - [c12]Ivar Jørstad, Do Van Thanh, Schahram Dustdar:
Personalisation of Next Generation Mobile Services. UMICS 2006 - [c11]Audun Wangensteen, Lars Lunde, Ivar Jørstad, Than van Do:
Secured enterprise access with strong SIM authentication. EDOC 2006: 463-466 - [c10]Do Van Thanh, Tore E. Jønvik, Do van Thuan, Ivar Jørstad:
Enhancing Internet Service Security Using GSM SIM Authentication. GLOBECOM 2006 - 2005
- [j1]Ivar Jørstad, Schahram Dustdar, Do Van Thanh:
An analysis of current mobile services and enabling technologies. Int. J. Ad Hoc Ubiquitous Comput. 1(1/2): 92-102 (2005) - [c9]Do Van Thanh, Ivar Jørstad:
A Service-Oriented Architecture Framework for Mobile Services. AICT/SAPIR/ELETE 2005: 65-70 - [c8]Ivar Jørstad, Schahram Dustdar, Do Van Thanh:
Service-Oriented Architectures and Mobile Services. CAiSE Workshops (2) 2005: 617-631 - [c7]Ivar Jørstad, Do Van Thanh, Schahram Dustdar:
A service continuity layer for mobile services. WCNC 2005: 2300-2305 - [c6]Ivar Jørstad, Schahram Dustdar, Do Van Thanh:
A Service Oriented Architecture Framework for Collaborative Services. WETICE 2005: 121-125 - [c5]Ivar Jørstad, Do Van Thanh, Schahram Dustdar:
The personalization of mobile services. WiMob (4) 2005: 59-65 - [c4]Do Van Thanh, Eivind Sivertsen, Jon-Finngard Moe, Ivar Jørstad:
Email access via mobile phone. WiMob (4) 2005: 145-150 - 2004
- [c3]Ivar Jørstad, Schahram Dustdar, Do Van Thanh:
Evolution of Mobile Services: An Analysis of Current Architectures with Prospect to Future. UMICS 2004: 125-137 - [c2]Ivar Jørstad, Do Van Thanh, Schahram Dustdar:
Towards Service Continuity for Generic Mobile Services. INTELLCOMM 2004: 319-326 - [c1]Ivar Jørstad, Do Van Thanh, Schahram Dustdar:
An Analysis of Service Continuity in Mobile Services. WETICE 2004: 121-126
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint