Bengt Sahlin

Learn More
This study is part of a nationwide case-referent study. All recent-onset Type 1 (insulin-dependent) diabetic children aged 0–14 years in Sweden were invited to participate. Referent subjects matched for age-, sex- and geographical distribution were selected. In all, 338 patients and 528 referent subjects took part. Life events during the last year prior to(More)
Ericsson understands that to fulfill operator requirements for flexible and secure solutions that involve its products, it must provide technical features that help operators with deterrence, prevention and protection, detection, response, and recovery. Security should be viewed as a process and not a state (Figure 1). It is about applying fit-to purpose,(More)
As computer network technology advanced and the use of distributed systems became more common , new security problems arouse. Internet Protocol Security (IPSEC) is a proposal for providing security services in Internet. It offers authentication, integrity and confidentiality for IP datagrams. Internet Protocol, version 6 (IPv6) is the new version of the(More)
In this paper, we present constructions for 3GPP Authentication and Key Agreement (AKA) that provides Perfect Forward Secrecy for the session key. Further, the constructs prevents an attacker, with access to the long-term pre-shared key, from simply eavesdropping the challenge RAND in the AKA run, and use the RAND and long-term pre-shared key to derive the(More)
  • 1