The SCEAS System
Navigation Menu

Search the dblp DataBase


Tuomas Aura: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tuomas Aura
    Fast Access Control Decisions from Delegation Certificate Databases. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:284-295 [Conf]
  2. Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
    Analysis of the HIP Base Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:481-493 [Conf]
  3. Tuomas Aura, Michael Roe, Jari Arkko
    Security of Internet Location Management. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:78-90 [Conf]
  4. Tuomas Aura, Johan Lilius
    Time Processes for Time Petri-Nets. [Citation Graph (0, 0)][DBLP]
    ICATPN, 1997, pp:136-155 [Conf]
  5. Tuomas Aura
    Strategies against Replay Attacks. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:59-69 [Conf]
  6. Tuomas Aura
    On the Structure of Delegation Networks. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:14-26 [Conf]
  7. Tuomas Aura, Matt Bishop, Dean Sniegowski
    Analyzing Single-Server Network Inhibition. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:108-117 [Conf]
  8. Tuomas Aura
    Distributed Access-Rights Managements with Delegations Certificates. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:211-235 [Conf]
  9. Tuomas Aura, Petteri Koponen, Juhana Räsänen
    Delegation-Based Control for Intelligent Network Services. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:284- [Conf]
  10. Tuomas Aura, Pekka Nikander
    Stateless connections. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:87-97 [Conf]
  11. Tuomas Aura
    Practical Invisibility in Digital Communication. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:265-278 [Conf]
  12. Tuomas Aura
    Cryptographically Generated Addresses (CGA). [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:29-43 [Conf]
  13. Jussipekka Leiwo, Tuomas Aura, Pekka Nikander
    Towards Network Denial of Service Resistant Protocols. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:301-310 [Conf]
  14. John R. Hughes, Tuomas Aura, Matt Bishop
    Using Conservation of Flow as a Security Mechanism in Network Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:132-131 [Conf]
  15. Tuomas Aura, Pekka Nikander, Gonzalo Camarillo
    Effects of Mobility and Multihoming on Transport-Protocol Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:12-26 [Conf]
  16. Tuomas Aura
    DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:178-181 [Conf]
  17. Tuomas Aura
    Mobile IPv6 Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:215-234 [Conf]
  18. Tuomas Aura, Silja Mäki
    Towards a Survivable Security Architecture for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:63-73 [Conf]
  19. Tuomas Aura, Pekka Nikander, Jussipekka Leiwo
    DOS-Resistant Authentication with Client Puzzles. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:170-177 [Conf]
  20. Tuomas Aura, Alf Zugenmaier
    Privacy, Control and Internet Mobility. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:133-145 [Conf]
  21. Tuomas Aura
    Privacy, Control and Internet Mobility (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:146-150 [Conf]
  22. Tuomas Aura, Michael Roe
    Designing the mobile IPv6 security protocol. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:332-356 [Journal]
  23. Tuomas Aura, Dieter Gollmann
    Communications security on the internet. [Citation Graph (0, 0)][DBLP]
    Software Focus, 2001, v:2, n:3, pp:104-111 [Journal]
  24. Tuomas Aura, Johan Lilius
    A causal semantics for time Petri nets. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:243, n:1-2, pp:409-447 [Journal]

  25. Chattering Laptops. [Citation Graph (, )][DBLP]

  26. How to Share Your Favourite Search Results while Preserving Privacy and Quality. [Citation Graph (, )][DBLP]

  27. Experiences with Host-to-Host IPsec. [Citation Graph (, )][DBLP]

  28. Experiences with Host-to-Host IPsec. [Citation Graph (, )][DBLP]

  29. Scanning electronic documents for personally identifiable information. [Citation Graph (, )][DBLP]

  30. Securing IPv6 neighbor and router discovery. [Citation Graph (, )][DBLP]

  31. Privacy-preserving 802.11 access-point discovery. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002