Follow
Karl Norrman
Karl Norrman
Security Researcher, Ericsson Research and KTH Royal Instintute of Technology
Verified email at ericsson.com - Homepage
Title
Cited by
Cited by
Year
The secure real-time transport protocol (SRTP)
M Baugher, D McGrew, M Naslund, E Carrara, K Norrman
15152004
MIKEY: multimedia internet keying
J Arkko, E Carrara, F Lindholm, K Norrman, M Naslund
5112004
Protecting IMSI and user privacy in 5G networks
K Norrman, M Näslund, E Dubrova
Proceedings of the 9th EAI international conference on mobile multimedia …, 2016
742016
Key management extensions for session description protocol (SDP) and real time streaming protocol (RTSP)
J Arkko, E Carrara, F Lindholm, K Norrman, M Naslund
442006
Secure federated learning in 5G mobile networks
M Isaksson, K Norrman
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
302020
A USIM compatible 5G AKA protocol with perfect forward secrecy
J Arkko, K Norrman, M Näslund, B Sahlin
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1205-1209, 2015
272015
Formal analysis of EDHOC key establishment for constrained IoT devices
K Norrman, V Sundararajan, A Bruni
arXiv preprint arXiv:2007.11427, 2020
182020
Security in the evolved packet system
R Blom, K Norrman, M Naslund, S Rommer, B Sahlin
Ericsson Review, Feb, 2010
152010
Subscription identifier privacy in 5G systems
EC Jiménez, PK Nakarmi, M Näslund, K Norrman
2017 international conference on selected topics in mobile and wireless …, 2017
132017
Formal analysis of security procedures in LTE-a feasibility study
N Ben Henda, K Norrman
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
132014
Conversational IP multimedia security
R Blom, E Carrara, F Lindholm, K Norrman, M Naslund
4th International Workshop on Mobile and Wireless Communications Network …, 2002
112002
Formal verification of the security for dual connectivity in LTE
NB Henda, K Norrman, K Pfeffer
Proceedings of the Third FME Workshop on Formal Methods in Software …, 2015
62015
5g security enabling a trust-worthy 5g system
K Norrman, PK Nakarmi, E Fogelstrm
Ericsson, 2018
52018
Error-correcting message authentication for 5g
E Dubrova, M Näslund, G Selander, K Norrman
Proceedings of the 9th EAI International Conference on Mobile Multimedia …, 2016
52016
The Key ID Information Type for the General Extension Payload in Multimedia Internet KEYing (MIKEY)
E Carrara, K Norrman, V Lehtovirta
42006
Key management and protection for IP multimedia
R Blom, E Carrara, F Lindholm, K Norrman, M Näslund
Multimedia Security Handbook, 169, 2004
32004
Integrity Transform Carrying Roll-Over Counter for the Secure Real-time Transport Protocol (SRTP)
V Lehtovirta, M Naslund, K Norrman
22007
Secure Anycast Channels with Applications to 4G and 5G Handovers
K Norrman
Cryptology ePrint Archive, 2022
2022
OpenSAW: Open Security Analysis Workbench
NB Henda, B Johansson, P Lantz, K Norrman, P Saarinen, O Segersvärd
International Conference on Fundamental Approaches to Software Engineering …, 2017
2017
SRTP Store-and-Forward Use Cases and Requirements
F Lindholm, K Norrman, M Naslund, J Mattsson, Y Cheng, R Blom
2011
The system can't perform the operation now. Try again later.
Articles 1–20