2008 |
32 | EE | Gonzalo Camarillo,
Ignacio Mas,
Pekka Nikander:
A Framework to Combine the Session Initiation Protocol and the Host Identity Protocol.
WCNC 2008: 3051-3056 |
31 | EE | Andrei Gurtov,
Dmitry Korzun,
Andrey Lukyanenko,
Pekka Nikander:
Hi3: An efficient and secure networking architecture for mobile hosts.
Computer Communications 31(10): 2457-2467 (2008) |
2005 |
30 | EE | Jari Arkko,
Pekka Nikander,
Mats Näslund:
Enhancing Privacy with Shared Pseudo Random Sequences.
Security Protocols Workshop 2005: 187-196 |
29 | EE | Pekka Nikander:
Enhancing Privacy with Shared Pseudo Random Sequences.
Security Protocols Workshop 2005: 197-203 |
2004 |
28 | EE | Tuomas Aura,
Pekka Nikander,
Gonzalo Camarillo:
Effects of Mobility and Multihoming on Transport-Protocol Security.
IEEE Symposium on Security and Privacy 2004: 12-26 |
27 | EE | Jukka Ylitalo,
Jan Melén,
Pekka Nikander,
Vesa Torvinen:
Re-thinking Security in IP Based Micro-Mobility.
ISC 2004: 318-329 |
26 | EE | Pekka Nikander:
Applying Host Identity Protocol to the Internet Addressing Architecture.
SAINT 2004: 5 |
25 | EE | Jukka Ylitalo,
Pekka Nikander:
BLIND: A Complete Identity Protection Framework for End-Points.
Security Protocols Workshop 2004: 163-176 |
2003 |
24 | EE | Pekka Nikander,
Jukka Ylitalo,
Jorma Wall:
Integrating Security, Mobility and Multi-Homing in a HIP Way.
NDSS 2003 |
23 | EE | Matt Blaze,
John Ioannidis,
Sotiris Ioannidis,
Angelos D. Keromytis,
Pekka Nikander,
Vassilis Prevelakis:
TAPI: Transactions for Accessing Public Infrastructure.
PWC 2003: 90-100 |
22 | EE | Jari Arkko,
Pekka Nikander:
Limitations of IPsec Policy Mechanisms.
Security Protocols Workshop 2003: 241-251 |
2002 |
21 | | Pekka Nikander:
Trustworthiness as an Asset.
GI Jahrestagung 2002: 100-105 |
20 | | Pekka Nikander:
Trustworthiness as an Asset.
GI Jahrestagung 2002: 429-429 |
19 | EE | Pekka Nikander,
Jari Arkko:
Delegation of Signalling Rights.
Security Protocols Workshop 2002: 203-214 |
18 | EE | Jari Arkko,
Pekka Nikander:
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.
Security Protocols Workshop 2002: 5-19 |
17 | EE | Pekka Nikander:
Authorization and Charging in Public WLANs Using FreeBSD and 802.1x.
USENIX Annual Technical Conference, FREENIX Track 2002: 109-119 |
16 | EE | Jari Arkko,
Tuomas Aura,
James Kempf,
Vesa-Matti Mäntylä,
Pekka Nikander,
Michael Roe:
Securing IPv6 neighbor and router discovery.
Workshop on Wireless Security 2002: 77-86 |
2001 |
15 | EE | Pasi Eronen,
Pekka Nikander:
Decentralized Jini Security.
NDSS 2001 |
14 | EE | Pekka Nikander:
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.
Security Protocols Workshop 2001: 12-21 |
13 | EE | Pekka Nikander:
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion).
Security Protocols Workshop 2001: 22-26 |
2000 |
12 | | Tommi Elo,
Pekka Nikander:
Decentralized Authorization with ECDSA on a Java Smart Card.
CARDIS 2000: 345-364 |
11 | EE | Christian Gehrmann,
Pekka Nikander:
Securing ad hoc services, a Jini view: extended abstract.
MobiHoc 2000: 135-136 |
10 | | Jussipekka Leiwo,
Tuomas Aura,
Pekka Nikander:
Towards Network Denial of Service Resistant Protocols.
SEC 2000: 301-310 |
9 | | Pekka Nikander,
Lasse Metso:
Policy and Trust in Open Multi-Operator Networks.
SMARTNET 2000: 419-436 |
8 | EE | Tuomas Aura,
Pekka Nikander,
Jussipekka Leiwo:
DOS-Resistant Authentication with Client Puzzles.
Security Protocols Workshop 2000: 170-177 |
7 | EE | Pekka Nikander,
Kristiina Karvonen:
Users and Trust in Cyberspace.
Security Protocols Workshop 2000: 24-35 |
6 | EE | Pekka Nikander:
Users and Trust in Cyberspace (Transcript of Discussion).
Security Protocols Workshop 2000: 36-42 |
5 | EE | Pekka Nikander:
An Operating System in Java for the Lego Mindstorms RCX Microcontroller.
USENIX Annual Technical Conference, FREENIX Track 2000: 235-249 |
1999 |
4 | EE | Pekka Nikander,
Jonna Partanen:
Distributed Policy Management for JDK 1.2.
NDSS 1999 |
3 | EE | Pekka Nikander,
Yki Kortesniemi,
Jonna Partanen:
Preserving Privacy in Distributed Delegation with Fast Certificates.
Public Key Cryptography 1999: 136-153 |
1998 |
2 | EE | Ilari Lehti,
Pekka Nikander:
Certifying Trust.
Public Key Cryptography 1998: 83-98 |
1997 |
1 | | Tuomas Aura,
Pekka Nikander:
Stateless connections.
ICICS 1997: 87-97 |