The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jari Arkko: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tuomas Aura, Michael Roe, Jari Arkko
    Security of Internet Location Management. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:78-90 [Conf]
  2. Jari Arkko
    On the Existence and Production of State Identification Machines for Labelled Transition Systems. [Citation Graph (0, 0)][DBLP]
    FORTE, 1993, pp:351-366 [Conf]
  3. Jari Arkko
    Limitations of IPsec Policy Mechanisms (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:252-254 [Conf]
  4. Jari Arkko, Pekka Nikander
    Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:5-19 [Conf]
  5. Jari Arkko, Pekka Nikander
    Limitations of IPsec Policy Mechanisms. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:241-251 [Conf]
  6. Pasi Eronen, Jari Arkko
    Authentication Components: Engineering Experiences and Guidelines. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:68-77 [Conf]
  7. Pekka Nikander, Jari Arkko
    Delegation of Signalling Rights. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:203-214 [Conf]
  8. Vesa Hirvisalo, Jari Arkko, Juha Kuusela, Esko Nuutila, Markku Tamminen
    XE design rationale: Clu revisited. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1989, v:24, n:9, pp:72-79 [Journal]
  9. Esko Nuutila, Juha Kuusela, Markku Tamminen, Jukka Veilahti, Jari Arkko, Nassim Bouteldja
    XC - A Language for Embedded Rule Based Systems. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1987, v:22, n:9, pp:23-32 [Journal]
  10. Bengt Ahlgren, Jari Arkko, Lars Eggert, Jarno Rajahalme
    A Node Identity Internetworking Architecture. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]

  11. Enhancing Privacy with Shared Pseudo Random Sequences. [Citation Graph (, )][DBLP]


  12. Securing IPv6 neighbor and router discovery. [Citation Graph (, )][DBLP]


  13. Dagstuhl perspectives workshop on end-to-end protocols for the future internet. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002