| 2009 |
| 30 | EE | Janne Lindqvist,
Tuomas Aura,
George Danezis,
Teemu Koponen,
Annu Myllyniemi,
Jussi Mäki,
Michael Roe:
Privacy-preserving 802.11 access-point discovery.
WISEC 2009: 123-130 |
| 2008 |
| 29 | EE | Tuomas Aura,
Janne Lindqvist,
Michael Roe,
Anish Mohammed:
Chattering Laptops.
Privacy Enhancing Technologies 2008: 167-186 |
| 2006 |
| 28 | EE | Tuomas Aura,
Thomas A. Kuhn,
Michael Roe:
Scanning electronic documents for personally identifiable information.
WPES 2006: 41-50 |
| 27 | | Tuomas Aura,
Michael Roe:
Designing the mobile IPv6 security protocol.
Annales des Télécommunications 61(3-4): 332-356 (2006) |
| 2005 |
| 26 | EE | Tuomas Aura,
Aarthi Nagarajan,
Andrei Gurtov:
Analysis of the HIP Base Exchange Protocol.
ACISP 2005: 481-493 |
| 25 | EE | Tuomas Aura:
Experiences with Host-to-Host IPsec.
Security Protocols Workshop 2005: 23-30 |
| 24 | EE | Tuomas Aura,
Michael Roe,
Anish Mohammed:
Experiences with Host-to-Host IPsec.
Security Protocols Workshop 2005: 3-22 |
| 2004 |
| 23 | EE | Tuomas Aura,
Pekka Nikander,
Gonzalo Camarillo:
Effects of Mobility and Multihoming on Transport-Protocol Security.
IEEE Symposium on Security and Privacy 2004: 12-26 |
| 22 | EE | Tuomas Aura,
Alf Zugenmaier:
Privacy, Control and Internet Mobility.
Security Protocols Workshop 2004: 133-145 |
| 21 | EE | Tuomas Aura:
Privacy, Control and Internet Mobility (Transcript of Discussion).
Security Protocols Workshop 2004: 146-150 |
| 2003 |
| 20 | EE | Tuomas Aura:
Cryptographically Generated Addresses (CGA).
ISC 2003: 29-43 |
| 2002 |
| 19 | EE | Tuomas Aura,
Michael Roe,
Jari Arkko:
Security of Internet Location Management.
ACSAC 2002: 78-90 |
| 18 | EE | Tuomas Aura:
Mobile IPv6 Security.
Security Protocols Workshop 2002: 215-234 |
| 17 | EE | Jari Arkko,
Tuomas Aura,
James Kempf,
Vesa-Matti Mäntylä,
Pekka Nikander,
Michael Roe:
Securing IPv6 neighbor and router discovery.
Workshop on Wireless Security 2002: 77-86 |
| 2001 |
| 16 | EE | Tuomas Aura,
Silja Mäki:
Towards a Survivable Security Architecture for Ad-Hoc Networks.
Security Protocols Workshop 2001: 63-73 |
| 15 | | Tuomas Aura,
Dieter Gollmann:
Communications security on the internet.
Software Focus 2(3): 104-111 (2001) |
| 2000 |
| 14 | EE | Tuomas Aura,
Matt Bishop,
Dean Sniegowski:
Analyzing Single-Server Network Inhibition.
CSFW 2000: 108-117 |
| 13 | EE | John R. Hughes,
Tuomas Aura,
Matt Bishop:
Using Conservation of Flow as a Security Mechanism in Network Protocols.
IEEE Symposium on Security and Privacy 2000: 132-131 |
| 12 | | Jussipekka Leiwo,
Tuomas Aura,
Pekka Nikander:
Towards Network Denial of Service Resistant Protocols.
SEC 2000: 301-310 |
| 11 | EE | Tuomas Aura,
Pekka Nikander,
Jussipekka Leiwo:
DOS-Resistant Authentication with Client Puzzles.
Security Protocols Workshop 2000: 170-177 |
| 10 | EE | Tuomas Aura:
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion).
Security Protocols Workshop 2000: 178-181 |
| 9 | EE | Tuomas Aura,
Johan Lilius:
A causal semantics for time Petri nets.
Theor. Comput. Sci. 243(1-2): 409-447 (2000) |
| 1999 |
| 8 | | Tuomas Aura:
Distributed Access-Rights Managements with Delegations Certificates.
Secure Internet Programming 1999: 211-235 |
| 1998 |
| 7 | EE | Tuomas Aura:
Fast Access Control Decisions from Delegation Certificate Databases.
ACISP 1998: 284-295 |
| 6 | EE | Tuomas Aura:
On the Structure of Delegation Networks.
CSFW 1998: 14-26 |
| 5 | EE | Tuomas Aura,
Petteri Koponen,
Juhana Räsänen:
Delegation-Based Control for Intelligent Network Services.
ECOOP Workshops 1998: 284 |
| 1997 |
| 4 | EE | Tuomas Aura:
Strategies against Replay Attacks.
CSFW 1997: 59-69 |
| 3 | | Tuomas Aura,
Johan Lilius:
Time Processes for Time Petri-Nets.
ICATPN 1997: 136-155 |
| 2 | | Tuomas Aura,
Pekka Nikander:
Stateless connections.
ICICS 1997: 87-97 |
| 1996 |
| 1 | | Tuomas Aura:
Practical Invisibility in Digital Communication.
Information Hiding 1996: 265-278 |