dblp.uni-trier.dewww.uni-trier.de

Jussipekka Leiwo

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
26EEYi Wang, Douglas L. Maskell, Jussipekka Leiwo: A unified architecture for a public key cryptographic coprocessor. Journal of Systems Architecture - Embedded Systems Design 54(10): 1004-1016 (2008)
2007
25EEYu Yu, Jussipekka Leiwo, Benjamin Premkumar: Private stateful circuits secure against probing attacks. ASIACCS 2007: 63-69
2006
24EEYu Yu, Jussipekka Leiwo, Benjamin Premkumar: Hiding Circuit Topology from Unbounded Reverse Engineers. ACISP 2006: 171-182
23EEYi Wang, Douglas L. Maskell, Jussipekka Leiwo, Thambipillai Srikanthan: Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. APCCAS 2006: 1655-1658
22EEYi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Luo Jianwen: An Efficient Algorithm for DPA-resistent RSA. APCCAS 2006: 1659-1662
21EEDouglas L. Maskell, Jussipekka Leiwo, Jagdish Chandra Patra: The design of multiplierless FIR filters with a minimum adder step and reduced hardware complexity. ISCAS 2006
20EEYu Yu, Jussipekka Leiwo, Benjamin Premkumar: A Study on the Security of Privacy Homomorphism. ITNG 2006: 470-475
19EEYi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu: FPGA based DPA-resistant Unified Architecture for Signcryption. ITNG 2006: 571-572
18EEJussipekka Leiwo, Lam-For Kwok, Douglas L. Maskell, Nenad Stankovic: A technique for expressing IT security objectives. Information & Software Technology 48(7): 532-539 (2006)
2005
17EEYu Yu, Jussipekka Leiwo, Benjamin Premkumar: An Improved Secure Two-Party Computation Protocol. CISC 2005: 221-232
16EEYi Wang, Jussipekka Leiwo, Thambipillai Srikanthan: Efficient high radix modular multiplication for high-speed computing in re-configurable hardware [cryptographic applications]. ISCAS (2) 2005: 1226-1229
15EEYu Yu, Jussipekka Leiwo, Benjamin Premkumar: Securely Utilizing External Computing Power. ITCC (1) 2005: 762-767
14EEJussipekka Leiwo, Teemupekka Virtanen: Understanding and Communicating It Security Specifications with Uml. International Journal of Software Engineering and Knowledge Engineering 15(6): 923-940 (2005)
2000
13 Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng: High Performance Agile Crypto Modules. ACISP 2000: 74-88
12 Jussipekka Leiwo, Tuomas Aura, Pekka Nikander: Towards Network Denial of Service Resistant Protocols. SEC 2000: 301-310
11 Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum: Disallowing Unauthorized State Changes of Distributed Shared Objects. SEC 2000: 381-390
10EETuomas Aura, Pekka Nikander, Jussipekka Leiwo: DOS-Resistant Authentication with Client Puzzles. Security Protocols Workshop 2000: 170-177
1999
9EEJussipekka Leiwo, Chandana Gamage, Yuliang Zheng: Organizational Modeling for Efficient Specification of Information Security Requirements. ADBIS 1999: 247-260
8EEJussipekka Leiwo: A Mechanism for Deriving Specifications of Security Functions in the CC Framework. DEXA 1999: 416-425
7 Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng: Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. ICISC 1999: 120-131
6 Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum: A Security Design for a Wide-Area Distributed System. ICISC 1999: 236-256
5EEChandana Gamage, Jussipekka Leiwo, Yuliang Zheng: Encrypted Message Authentication by Firewalls. Public Key Cryptography 1999: 69-81
1998
4EEJussipekka Leiwo, Seppo Heikkuri: An Analysis of Ethics as Foundation of Information Security in Distributed Systems. HICSS (6) 1998: 213-222
1997
3 Jussipekka Leiwo, Yuliang Zheng: A Method to Implement a Denial of Service Protection Base. ACISP 1997: 90-101
2 Jussipekka Leiwo, Yuliang Zheng: A Framework for the Management of Information Security. ISW 1997: 232-245
1 Jussipekka Leiwo, Yuliang Zheng: A formal model to aid documenting and harmonizing of information security requirements. SEC 1997: 25-38

Coauthor Index

1Tuomas Aura [10] [12]
2Chandana Gamage [5] [6] [7] [9] [13]
3Christoph Hänle [6] [11]
4Seppo Heikkuri [4]
5Philip Homburg [6] [11]
6Luo Jianwen [22]
7Lam-For Kwok [18]
8Douglas L. Maskell [18] [21] [23] [26]
9Pekka Nikander [10] [12]
10Jagdish Chandra Patra [21]
11Benjamin Premkumar [15] [17] [20] [24] [25]
12Thambipillai Srikanthan [16] [19] [22] [23]
13Nenad Stankovic [18]
14Andrew S. Tanenbaum [6] [11]
15Teemupekka Virtanen [14]
16Yi Wang [16] [19] [22] [23] [26]
17Yu Yu [15] [17] [19] [20] [24] [25]
18Yuliang Zheng [1] [2] [3] [5] [7] [9] [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)