2009 |
33 | EE | Kari Kostiainen,
Jan-Erik Ekberg,
N. Asokan,
Aarne Rantala:
On-board credentials with open provisioning.
ASIACCS 2009: 104-115 |
2008 |
32 | EE | N. Asokan,
Jan-Erik Ekberg:
A Platform for OnBoard Credentials.
Financial Cryptography 2008: 318-320 |
31 | EE | Long Nguyen Hoang,
Pekka Laitinen,
N. Asokan:
Secure roaming with identity metasystems.
IDtrust 2008: 36-47 |
30 | EE | André Osterhues,
Ahmad-Reza Sadeghi,
Marko Wolf,
Christian Stüble,
N. Asokan:
Securing Peer-to-Peer Distributions for Mobile Devices.
ISPEC 2008: 161-175 |
29 | EE | Jan-Erik Ekberg,
N. Asokan,
Kari Kostiainen,
Aarne Rantala:
Scheduling execution of credentials in constrained secure environments.
STC 2008: 61-70 |
28 | EE | Andreas P. Heiner,
N. Asokan:
Using Salience Differentials to Making Visual Cues Noticeable.
UPSEC 2008 |
2007 |
27 | EE | Jani Suomalainen,
Jukka Valkonen,
N. Asokan:
Security Associations in Personal Networks: A Comparative Analysis.
ESAS 2007: 43-57 |
26 | EE | Ersin Uzun,
Kristiina Karvonen,
N. Asokan:
Usability Analysis of Secure Pairing Methods.
Financial Cryptography 2007: 307-324 |
25 | EE | Ahmad-Reza Sadeghi,
Marko Wolf,
Christian Stüble,
N. Asokan,
Jan-Erik Ekberg:
Enabling Fairer Digital Rights Management with Trusted Computing.
ISC 2007: 53-70 |
24 | EE | Andreas P. Heiner,
N. Asokan:
Secure software installation in a mobile environment.
SOUPS 2007: 155-156 |
23 | EE | Yacine Gasmi,
Ahmad-Reza Sadeghi,
Patrick Stewin,
Martin Unger,
N. Asokan:
Beyond secure channels.
STC 2007: 30-40 |
2006 |
22 | | Jarkko Tolvanen,
Tapio Suihko,
Jaakko Lipasti,
N. Asokan:
Remote storage for mobile devices.
COMSWARE 2006 |
21 | EE | Jukka Valkonen,
N. Asokan,
Kaisa Nyberg:
Ad Hoc Security Associations for Groups.
ESAS 2006: 150-164 |
20 | EE | Nitesh Saxena,
Jan-Erik Ekberg,
Kari Kostiainen,
N. Asokan:
Secure Device Pairing based on a Visual Channel (Short Paper).
IEEE Symposium on Security and Privacy 2006: 306-313 |
2005 |
19 | EE | N. Asokan,
Seamus Moloney,
Philip Ginzboorg,
Kari Kostiainen:
Visitor Access Management in Personal Wireless Networks.
ISM 2005: 686-694 |
2003 |
18 | EE | Sampo Sovio,
N. Asokan,
Kaisa Nyberg:
Defining Authorization Domains Using Virtual Devices.
SAINT Workshops 2003: 331-336 |
17 | EE | N. Asokan,
Valtteri Niemi,
Kaisa Nyberg:
Man-in-the-Middle in Tunnelled Authentication Protocols.
Security Protocols Workshop 2003: 28-41 |
16 | EE | N. Asokan:
Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion).
Security Protocols Workshop 2003: 42-48 |
2002 |
15 | EE | Helger Lipmaa,
N. Asokan,
Valtteri Niemi:
Secure Vickrey Auctions without Threshold Trust.
Financial Cryptography 2002: 87-101 |
14 | EE | Manel Guerrero Zapata,
N. Asokan:
Securing ad hoc routing protocols.
Workshop on Wireless Security 2002: 1-10 |
2000 |
13 | | N. Asokan,
Philippe A. Janson,
Michael Steiner,
Michael Waidner:
State of the art in electronic payment systems.
Advances in Computers 53: 426-451 (2000) |
12 | EE | N. Asokan,
Philip Ginzboorg:
Key agreement in ad hoc networks.
Computer Communications 23(17): 1627-1637 (2000) |
1999 |
11 | EE | N. Asokan,
Hervé Debar,
Michael Steiner,
Michael Waidner:
Authenticating public terminals.
Computer Networks 31(8): 861-870 (1999) |
1998 |
10 | EE | N. Asokan,
Victor Shoup,
Michael Waidner:
Optimistic Fair Exchange of Digital Signatures (Extended Abstract).
EUROCRYPT 1998: 591-606 |
9 | EE | N. Asokan,
Victor Shoup,
Michael Waidner:
Asynchronous Protocols for Optimistic Fair Exchange.
IEEE Symposium on Security and Privacy 1998: 86-99 |
8 | EE | Günter Karjoth,
N. Asokan,
Ceki Gülcü:
Protecting the Computation Results of Free-Roaming Agents.
Mobile Agents 1998: 195-207 |
7 | | José L. Abad Peiro,
N. Asokan,
Michael Steiner,
Michael Waidner:
Designing a Generic Payment Service.
IBM Systems Journal 37(1): 72-88 (1998) |
6 | | Günter Karjoth,
N. Asokan,
Ceki Gülcü:
Protecting the Computation Results of Free-Roaming Agents.
Personal and Ubiquitous Computing 2(2): (1998) |
1997 |
5 | EE | N. Asokan,
Matthias Schunter,
Michael Waidner:
Optimistic Protocols for Fair Exchange.
ACM Conference on Computer and Communications Security 1997: 7-17 |
4 | | N. Asokan,
Philippe A. Janson,
Michael Steiner,
Michael Waidner:
The State of the Art in Electronic Payment Systems.
IEEE Computer 30(9): 28-35 (1997) |
3 | | N. Asokan,
Gene Tsudik,
Michael Waidner:
Server-Supported Signatures.
Journal of Computer Security 5(1): 91-108 (1997) |
1996 |
2 | EE | N. Asokan,
Gene Tsudik,
Michael Waidner:
Server-Supported Signatures.
ESORICS 1996: 131-143 |
1995 |
1 | EE | Didier Samfat,
Refik Molva,
N. Asokan:
Untraceability in Mobile Networks.
MOBICOM 1995: 26-36 |