The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pekka Nikander: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tommi Elo, Pekka Nikander
    Decentralized Authorization with ECDSA on a Java Smart Card. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:345-364 [Conf]
  2. Pekka Nikander
    Trustworthiness as an Asset. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:100-105 [Conf]
  3. Pekka Nikander
    Trustworthiness as an Asset. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:429-429 [Conf]
  4. Tuomas Aura, Pekka Nikander
    Stateless connections. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:87-97 [Conf]
  5. Matt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis
    TAPI: Transactions for Accessing Public Infrastructure. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:90-100 [Conf]
  6. Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen
    Re-thinking Security in IP Based Micro-Mobility. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:318-329 [Conf]
  7. Christian Gehrmann, Pekka Nikander
    Securing ad hoc services, a Jini view: extended abstract. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2000, pp:135-136 [Conf]
  8. Pasi Eronen, Pekka Nikander
    Decentralized Jini Security. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  9. Pekka Nikander, Jonna Partanen
    Distributed Policy Management for JDK 1.2. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  10. Pekka Nikander, Jukka Ylitalo, Jorma Wall
    Integrating Security, Mobility and Multi-Homing in a HIP Way. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  11. Ilari Lehti, Pekka Nikander
    Certifying Trust. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:83-98 [Conf]
  12. Pekka Nikander, Yki Kortesniemi, Jonna Partanen
    Preserving Privacy in Distributed Delegation with Fast Certificates. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:136-153 [Conf]
  13. Pekka Nikander
    Applying Host Identity Protocol to the Internet Addressing Architecture. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:5- [Conf]
  14. Jussipekka Leiwo, Tuomas Aura, Pekka Nikander
    Towards Network Denial of Service Resistant Protocols. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:301-310 [Conf]
  15. Pekka Nikander, Lasse Metso
    Policy and Trust in Open Multi-Operator Networks. [Citation Graph (0, 0)][DBLP]
    SMARTNET, 2000, pp:419-436 [Conf]
  16. Tuomas Aura, Pekka Nikander, Gonzalo Camarillo
    Effects of Mobility and Multihoming on Transport-Protocol Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:12-26 [Conf]
  17. Jari Arkko, Pekka Nikander
    Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:5-19 [Conf]
  18. Jari Arkko, Pekka Nikander
    Limitations of IPsec Policy Mechanisms. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:241-251 [Conf]
  19. Tuomas Aura, Pekka Nikander, Jussipekka Leiwo
    DOS-Resistant Authentication with Client Puzzles. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:170-177 [Conf]
  20. Pekka Nikander
    Users and Trust in Cyberspace (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:36-42 [Conf]
  21. Pekka Nikander
    Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:12-21 [Conf]
  22. Pekka Nikander
    Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:22-26 [Conf]
  23. Pekka Nikander, Jari Arkko
    Delegation of Signalling Rights. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:203-214 [Conf]
  24. Pekka Nikander, Kristiina Karvonen
    Users and Trust in Cyberspace. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:24-35 [Conf]
  25. Jukka Ylitalo, Pekka Nikander
    BLIND: A Complete Identity Protection Framework for End-Points. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:163-176 [Conf]
  26. Pekka Nikander
    An Operating System in Java for the Lego Mindstorms RCX Microcontroller. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2000, pp:235-249 [Conf]
  27. Pekka Nikander
    Authorization and Charging in Public WLANs Using FreeBSD and 802.1x. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2002, pp:109-119 [Conf]

  28. LIPSIN: line speed publish/subscribe inter-networking. [Citation Graph (, )][DBLP]


  29. Enhancing Privacy with Shared Pseudo Random Sequences. [Citation Graph (, )][DBLP]


  30. Enhancing Privacy with Shared Pseudo Random Sequences. [Citation Graph (, )][DBLP]


  31. Securing IPv6 neighbor and router discovery. [Citation Graph (, )][DBLP]


  32. Incentive-compatible caching and peering in data-oriented networks. [Citation Graph (, )][DBLP]


  33. A Framework to Combine the Session Initiation Protocol and the Host Identity Protocol. [Citation Graph (, )][DBLP]


  34. Hi3: An efficient and secure networking architecture for mobile hosts. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.307secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002