![]() |
| 2008 | ||
|---|---|---|
| 3 | EE | Kimmo Halunen, Pauli Rikula, Juha Röning: On the Security of VSH in Password Schemes. ARES 2008: 828-833 |
| 2 | EE | Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning: Vulnerability Dependencies in Antivirus Software. SECURWARE 2008: 273-278 |
| 1 | EE | Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietikäinen, Mika Seppänen, Kimmo Halunen, Rauli Puuperä, Juha Röning: Experiences with Model Inference Assisted Fuzzing. WOOT 2008 |
| 1 | Kreetta Askola | [2] |
| 2 | Juhani Eronen | [2] |
| 3 | Aki Helin | [1] |
| 4 | Marko Laakso | [1] [2] |
| 5 | Pekka Pietikäinen | [1] [2] |
| 6 | Rauli Puuperä | [1] [2] |
| 7 | Pauli Rikula | [3] |
| 8 | Juha Röning | [1] [2] [3] |
| 9 | Mika Seppänen | [1] |
| 10 | Joachim Viide | [1] |