Obserwuj
Tuomas Aura
Tuomas Aura
Professor of Computer Science and Engineering, Aalto University
Zweryfikowany adres z aalto.fi
Tytuł
Cytowane przez
Cytowane przez
Rok
Cryptographically generated addresses (CGA)
T Aura
International Conference on Information Security, 29-43, 2003
10542003
DOS-resistant authentication with client puzzles
T Aura, P Nikander, J Leiwo
International workshop on security protocols, 170-177, 2000
6522000
Scanning electronic documents for personally identifiable information
T Aura, TA Kuhn, M Roe
Proceedings of the 5th ACM workshop on Privacy in electronic society, 41-50, 2006
3402006
Mobile IP version 6 route optimization security design background
P Nikander, J Arkko, T Aura, G Montenegro, E Nordmark
2502005
Authentication method
T Aura
US Patent 6,711,400, 2004
2382004
Stateless connections, in proceedings of International Conference on Information and Communications Security
T Aura, P Nikander
ICICS'97 Beijing, November 1997, 1997
169*1997
Strategies against replay attacks
T Aura
Proceedings 10th Computer Security Foundations Workshop, 59-68, 1997
1571997
Spook in your network: Attacking an sdn with a compromised openflow switch
M Antikainen, T Aura, M Särelä
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014
1392014
Distributed access-rights management with delegation certificates
T Aura
Secure Internet programming: security issues for mobile and distributed …, 1999
1341999
Towards network denial of service resistant protocols
J Leiwo, T Aura, P Nikander
IFIP International Information Security Conference, 301-310, 2000
1322000
Practical invisibility in digital communication
T Aura
Information Hiding: First International Workshop Cambridge, UK, May 30–June …, 1996
1271996
Human input security codes
T Aura, M Roe
US Patent 7,610,487, 2009
1202009
Using time to determine a hash extension
T Aura, M Roe
US Patent 7,624,264, 2009
1112009
Mobile authentication system with reduced authentication delay
AT Aura
US Patent 6,947,725, 2005
1072005
Securing IPv6 neighbor and router discovery
J Arkko, T Aura, J Kempf, VM Mäntylä, P Nikander, M Roe
Proceedings of the 1st ACM workshop on Wireless security, 77-86, 2002
1072002
Forwarding anomalies in Bloom filter-based multicast
M Särelä, CE Rothenberg, T Aura, A Zahemszky, P Nikander, J Ott
2011 Proceedings IEEE INFOCOM, 2399-2407, 2011
1042011
Non-cryptographic addressing
T Aura, M Roe
US Patent 8,261,062, 2012
962012
On the structure of delegation networks
T Aura
Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998
871998
Using conservation of flow as a security mechanism in network protocols
JR Hughes, T Aura, M Bishop
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 132-141, 2000
822000
Time processes for time Petri nets
T Aura, J Lilius
Application and Theory of Petri Nets 1997: 18th International Conference …, 1997
821997
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20