![]() | ![]() |
2008 | ||
---|---|---|
3 | EE | Kimmo Halunen, Pauli Rikula, Juha Röning: On the Security of VSH in Password Schemes. ARES 2008: 828-833 |
2 | EE | Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning: Vulnerability Dependencies in Antivirus Software. SECURWARE 2008: 273-278 |
1 | EE | Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietikäinen, Mika Seppänen, Kimmo Halunen, Rauli Puuperä, Juha Röning: Experiences with Model Inference Assisted Fuzzing. WOOT 2008 |
1 | Kreetta Askola | [2] |
2 | Juhani Eronen | [2] |
3 | Aki Helin | [1] |
4 | Marko Laakso | [1] [2] |
5 | Pekka Pietikäinen | [1] [2] |
6 | Rauli Puuperä | [1] [2] |
7 | Pauli Rikula | [3] |
8 | Juha Röning | [1] [2] [3] |
9 | Mika Seppänen | [1] |
10 | Joachim Viide | [1] |