Search the dblp DataBase
Tuomas Aura :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tuomas Aura Fast Access Control Decisions from Delegation Certificate Databases. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:284-295 [Conf ] Tuomas Aura , Aarthi Nagarajan , Andrei Gurtov Analysis of the HIP Base Exchange Protocol. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:481-493 [Conf ] Tuomas Aura , Michael Roe , Jari Arkko Security of Internet Location Management. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:78-90 [Conf ] Tuomas Aura , Johan Lilius Time Processes for Time Petri-Nets. [Citation Graph (0, 0)][DBLP ] ICATPN, 1997, pp:136-155 [Conf ] Tuomas Aura Strategies against Replay Attacks. [Citation Graph (0, 0)][DBLP ] CSFW, 1997, pp:59-69 [Conf ] Tuomas Aura On the Structure of Delegation Networks. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:14-26 [Conf ] Tuomas Aura , Matt Bishop , Dean Sniegowski Analyzing Single-Server Network Inhibition. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:108-117 [Conf ] Tuomas Aura Distributed Access-Rights Managements with Delegations Certificates. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:211-235 [Conf ] Tuomas Aura , Petteri Koponen , Juhana Räsänen Delegation-Based Control for Intelligent Network Services. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1998, pp:284- [Conf ] Tuomas Aura , Pekka Nikander Stateless connections. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:87-97 [Conf ] Tuomas Aura Practical Invisibility in Digital Communication. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:265-278 [Conf ] Tuomas Aura Cryptographically Generated Addresses (CGA). [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:29-43 [Conf ] Jussipekka Leiwo , Tuomas Aura , Pekka Nikander Towards Network Denial of Service Resistant Protocols. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:301-310 [Conf ] John R. Hughes , Tuomas Aura , Matt Bishop Using Conservation of Flow as a Security Mechanism in Network Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:132-131 [Conf ] Tuomas Aura , Pekka Nikander , Gonzalo Camarillo Effects of Mobility and Multihoming on Transport-Protocol Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:12-26 [Conf ] Tuomas Aura DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:178-181 [Conf ] Tuomas Aura Mobile IPv6 Security. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2002, pp:215-234 [Conf ] Tuomas Aura , Silja Mäki Towards a Survivable Security Architecture for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:63-73 [Conf ] Tuomas Aura , Pekka Nikander , Jussipekka Leiwo DOS-Resistant Authentication with Client Puzzles. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:170-177 [Conf ] Tuomas Aura , Alf Zugenmaier Privacy, Control and Internet Mobility. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:133-145 [Conf ] Tuomas Aura Privacy, Control and Internet Mobility (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:146-150 [Conf ] Tuomas Aura , Michael Roe Designing the mobile IPv6 security protocol. [Citation Graph (0, 0)][DBLP ] Annales des Télécommunications, 2006, v:61, n:3-4, pp:332-356 [Journal ] Tuomas Aura , Dieter Gollmann Communications security on the internet. [Citation Graph (0, 0)][DBLP ] Software Focus, 2001, v:2, n:3, pp:104-111 [Journal ] Tuomas Aura , Johan Lilius A causal semantics for time Petri nets. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2000, v:243, n:1-2, pp:409-447 [Journal ] Chattering Laptops. [Citation Graph (, )][DBLP ] How to Share Your Favourite Search Results while Preserving Privacy and Quality. [Citation Graph (, )][DBLP ] Experiences with Host-to-Host IPsec. [Citation Graph (, )][DBLP ] Experiences with Host-to-Host IPsec. [Citation Graph (, )][DBLP ] Scanning electronic documents for personally identifiable information. [Citation Graph (, )][DBLP ] Securing IPv6 neighbor and router discovery. [Citation Graph (, )][DBLP ] Privacy-preserving 802.11 access-point discovery. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.008secs