Jari Arkko, Pekka Nikander Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:5-19 [Conf]
Pekka Nikander Users and Trust in Cyberspace (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:36-42 [Conf]
Pekka Nikander Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:12-21 [Conf]
Pekka Nikander Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:22-26 [Conf]
Pekka Nikander An Operating System in Java for the Lego Mindstorms RCX Microcontroller. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2000, pp:235-249 [Conf]
Pekka Nikander Authorization and Charging in Public WLANs Using FreeBSD and 802.1x. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2002, pp:109-119 [Conf]
LIPSIN: line speed publish/subscribe inter-networking. [Citation Graph (, )][DBLP]
Enhancing Privacy with Shared Pseudo Random Sequences. [Citation Graph (, )][DBLP]
Enhancing Privacy with Shared Pseudo Random Sequences. [Citation Graph (, )][DBLP]
Securing IPv6 neighbor and router discovery. [Citation Graph (, )][DBLP]
Incentive-compatible caching and peering in data-oriented networks. [Citation Graph (, )][DBLP]
A Framework to Combine the Session Initiation Protocol and the Host Identity Protocol. [Citation Graph (, )][DBLP]
Hi3: An efficient and secure networking architecture for mobile hosts. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.307secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP