2009 | ||
---|---|---|
33 | EE | Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala: On-board credentials with open provisioning. ASIACCS 2009: 104-115 |
2008 | ||
32 | EE | N. Asokan, Jan-Erik Ekberg: A Platform for OnBoard Credentials. Financial Cryptography 2008: 318-320 |
31 | EE | Long Nguyen Hoang, Pekka Laitinen, N. Asokan: Secure roaming with identity metasystems. IDtrust 2008: 36-47 |
30 | EE | André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan: Securing Peer-to-Peer Distributions for Mobile Devices. ISPEC 2008: 161-175 |
29 | EE | Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala: Scheduling execution of credentials in constrained secure environments. STC 2008: 61-70 |
28 | EE | Andreas P. Heiner, N. Asokan: Using Salience Differentials to Making Visual Cues Noticeable. UPSEC 2008 |
2007 | ||
27 | EE | Jani Suomalainen, Jukka Valkonen, N. Asokan: Security Associations in Personal Networks: A Comparative Analysis. ESAS 2007: 43-57 |
26 | EE | Ersin Uzun, Kristiina Karvonen, N. Asokan: Usability Analysis of Secure Pairing Methods. Financial Cryptography 2007: 307-324 |
25 | EE | Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg: Enabling Fairer Digital Rights Management with Trusted Computing. ISC 2007: 53-70 |
24 | EE | Andreas P. Heiner, N. Asokan: Secure software installation in a mobile environment. SOUPS 2007: 155-156 |
23 | EE | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan: Beyond secure channels. STC 2007: 30-40 |
2006 | ||
22 | Jarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. Asokan: Remote storage for mobile devices. COMSWARE 2006 | |
21 | EE | Jukka Valkonen, N. Asokan, Kaisa Nyberg: Ad Hoc Security Associations for Groups. ESAS 2006: 150-164 |
20 | EE | Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan: Secure Device Pairing based on a Visual Channel (Short Paper). IEEE Symposium on Security and Privacy 2006: 306-313 |
2005 | ||
19 | EE | N. Asokan, Seamus Moloney, Philip Ginzboorg, Kari Kostiainen: Visitor Access Management in Personal Wireless Networks. ISM 2005: 686-694 |
2003 | ||
18 | EE | Sampo Sovio, N. Asokan, Kaisa Nyberg: Defining Authorization Domains Using Virtual Devices. SAINT Workshops 2003: 331-336 |
17 | EE | N. Asokan, Valtteri Niemi, Kaisa Nyberg: Man-in-the-Middle in Tunnelled Authentication Protocols. Security Protocols Workshop 2003: 28-41 |
16 | EE | N. Asokan: Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). Security Protocols Workshop 2003: 42-48 |
2002 | ||
15 | EE | Helger Lipmaa, N. Asokan, Valtteri Niemi: Secure Vickrey Auctions without Threshold Trust. Financial Cryptography 2002: 87-101 |
14 | EE | Manel Guerrero Zapata, N. Asokan: Securing ad hoc routing protocols. Workshop on Wireless Security 2002: 1-10 |
2000 | ||
13 | N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: State of the art in electronic payment systems. Advances in Computers 53: 426-451 (2000) | |
12 | EE | N. Asokan, Philip Ginzboorg: Key agreement in ad hoc networks. Computer Communications 23(17): 1627-1637 (2000) |
1999 | ||
11 | EE | N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner: Authenticating public terminals. Computer Networks 31(8): 861-870 (1999) |
1998 | ||
10 | EE | N. Asokan, Victor Shoup, Michael Waidner: Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606 |
9 | EE | N. Asokan, Victor Shoup, Michael Waidner: Asynchronous Protocols for Optimistic Fair Exchange. IEEE Symposium on Security and Privacy 1998: 86-99 |
8 | EE | Günter Karjoth, N. Asokan, Ceki Gülcü: Protecting the Computation Results of Free-Roaming Agents. Mobile Agents 1998: 195-207 |
7 | José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner: Designing a Generic Payment Service. IBM Systems Journal 37(1): 72-88 (1998) | |
6 | Günter Karjoth, N. Asokan, Ceki Gülcü: Protecting the Computation Results of Free-Roaming Agents. Personal and Ubiquitous Computing 2(2): (1998) | |
1997 | ||
5 | EE | N. Asokan, Matthias Schunter, Michael Waidner: Optimistic Protocols for Fair Exchange. ACM Conference on Computer and Communications Security 1997: 7-17 |
4 | N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: The State of the Art in Electronic Payment Systems. IEEE Computer 30(9): 28-35 (1997) | |
3 | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. Journal of Computer Security 5(1): 91-108 (1997) | |
1996 | ||
2 | EE | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. ESORICS 1996: 131-143 |
1995 | ||
1 | EE | Didier Samfat, Refik Molva, N. Asokan: Untraceability in Mobile Networks. MOBICOM 1995: 26-36 |