2009 |
30 | EE | Janne Lindqvist,
Tuomas Aura,
George Danezis,
Teemu Koponen,
Annu Myllyniemi,
Jussi Mäki,
Michael Roe:
Privacy-preserving 802.11 access-point discovery.
WISEC 2009: 123-130 |
2008 |
29 | EE | Tuomas Aura,
Janne Lindqvist,
Michael Roe,
Anish Mohammed:
Chattering Laptops.
Privacy Enhancing Technologies 2008: 167-186 |
2006 |
28 | EE | Tuomas Aura,
Thomas A. Kuhn,
Michael Roe:
Scanning electronic documents for personally identifiable information.
WPES 2006: 41-50 |
27 | | Tuomas Aura,
Michael Roe:
Designing the mobile IPv6 security protocol.
Annales des Télécommunications 61(3-4): 332-356 (2006) |
2005 |
26 | EE | Tuomas Aura,
Aarthi Nagarajan,
Andrei Gurtov:
Analysis of the HIP Base Exchange Protocol.
ACISP 2005: 481-493 |
25 | EE | Tuomas Aura:
Experiences with Host-to-Host IPsec.
Security Protocols Workshop 2005: 23-30 |
24 | EE | Tuomas Aura,
Michael Roe,
Anish Mohammed:
Experiences with Host-to-Host IPsec.
Security Protocols Workshop 2005: 3-22 |
2004 |
23 | EE | Tuomas Aura,
Pekka Nikander,
Gonzalo Camarillo:
Effects of Mobility and Multihoming on Transport-Protocol Security.
IEEE Symposium on Security and Privacy 2004: 12-26 |
22 | EE | Tuomas Aura,
Alf Zugenmaier:
Privacy, Control and Internet Mobility.
Security Protocols Workshop 2004: 133-145 |
21 | EE | Tuomas Aura:
Privacy, Control and Internet Mobility (Transcript of Discussion).
Security Protocols Workshop 2004: 146-150 |
2003 |
20 | EE | Tuomas Aura:
Cryptographically Generated Addresses (CGA).
ISC 2003: 29-43 |
2002 |
19 | EE | Tuomas Aura,
Michael Roe,
Jari Arkko:
Security of Internet Location Management.
ACSAC 2002: 78-90 |
18 | EE | Tuomas Aura:
Mobile IPv6 Security.
Security Protocols Workshop 2002: 215-234 |
17 | EE | Jari Arkko,
Tuomas Aura,
James Kempf,
Vesa-Matti Mäntylä,
Pekka Nikander,
Michael Roe:
Securing IPv6 neighbor and router discovery.
Workshop on Wireless Security 2002: 77-86 |
2001 |
16 | EE | Tuomas Aura,
Silja Mäki:
Towards a Survivable Security Architecture for Ad-Hoc Networks.
Security Protocols Workshop 2001: 63-73 |
15 | | Tuomas Aura,
Dieter Gollmann:
Communications security on the internet.
Software Focus 2(3): 104-111 (2001) |
2000 |
14 | EE | Tuomas Aura,
Matt Bishop,
Dean Sniegowski:
Analyzing Single-Server Network Inhibition.
CSFW 2000: 108-117 |
13 | EE | John R. Hughes,
Tuomas Aura,
Matt Bishop:
Using Conservation of Flow as a Security Mechanism in Network Protocols.
IEEE Symposium on Security and Privacy 2000: 132-131 |
12 | | Jussipekka Leiwo,
Tuomas Aura,
Pekka Nikander:
Towards Network Denial of Service Resistant Protocols.
SEC 2000: 301-310 |
11 | EE | Tuomas Aura,
Pekka Nikander,
Jussipekka Leiwo:
DOS-Resistant Authentication with Client Puzzles.
Security Protocols Workshop 2000: 170-177 |
10 | EE | Tuomas Aura:
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion).
Security Protocols Workshop 2000: 178-181 |
9 | EE | Tuomas Aura,
Johan Lilius:
A causal semantics for time Petri nets.
Theor. Comput. Sci. 243(1-2): 409-447 (2000) |
1999 |
8 | | Tuomas Aura:
Distributed Access-Rights Managements with Delegations Certificates.
Secure Internet Programming 1999: 211-235 |
1998 |
7 | EE | Tuomas Aura:
Fast Access Control Decisions from Delegation Certificate Databases.
ACISP 1998: 284-295 |
6 | EE | Tuomas Aura:
On the Structure of Delegation Networks.
CSFW 1998: 14-26 |
5 | EE | Tuomas Aura,
Petteri Koponen,
Juhana Räsänen:
Delegation-Based Control for Intelligent Network Services.
ECOOP Workshops 1998: 284 |
1997 |
4 | EE | Tuomas Aura:
Strategies against Replay Attacks.
CSFW 1997: 59-69 |
3 | | Tuomas Aura,
Johan Lilius:
Time Processes for Time Petri-Nets.
ICATPN 1997: 136-155 |
2 | | Tuomas Aura,
Pekka Nikander:
Stateless connections.
ICICS 1997: 87-97 |
1996 |
1 | | Tuomas Aura:
Practical Invisibility in Digital Communication.
Information Hiding 1996: 265-278 |