dblp.uni-trier.dewww.uni-trier.de

Pekka Nikander

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
32EEGonzalo Camarillo, Ignacio Mas, Pekka Nikander: A Framework to Combine the Session Initiation Protocol and the Host Identity Protocol. WCNC 2008: 3051-3056
31EEAndrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, Pekka Nikander: Hi3: An efficient and secure networking architecture for mobile hosts. Computer Communications 31(10): 2457-2467 (2008)
2005
30EEJari Arkko, Pekka Nikander, Mats Näslund: Enhancing Privacy with Shared Pseudo Random Sequences. Security Protocols Workshop 2005: 187-196
29EEPekka Nikander: Enhancing Privacy with Shared Pseudo Random Sequences. Security Protocols Workshop 2005: 197-203
2004
28EETuomas Aura, Pekka Nikander, Gonzalo Camarillo: Effects of Mobility and Multihoming on Transport-Protocol Security. IEEE Symposium on Security and Privacy 2004: 12-26
27EEJukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen: Re-thinking Security in IP Based Micro-Mobility. ISC 2004: 318-329
26EEPekka Nikander: Applying Host Identity Protocol to the Internet Addressing Architecture. SAINT 2004: 5
25EEJukka Ylitalo, Pekka Nikander: BLIND: A Complete Identity Protection Framework for End-Points. Security Protocols Workshop 2004: 163-176
2003
24EEPekka Nikander, Jukka Ylitalo, Jorma Wall: Integrating Security, Mobility and Multi-Homing in a HIP Way. NDSS 2003
23EEMatt Blaze, John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander, Vassilis Prevelakis: TAPI: Transactions for Accessing Public Infrastructure. PWC 2003: 90-100
22EEJari Arkko, Pekka Nikander: Limitations of IPsec Policy Mechanisms. Security Protocols Workshop 2003: 241-251
2002
21 Pekka Nikander: Trustworthiness as an Asset. GI Jahrestagung 2002: 100-105
20 Pekka Nikander: Trustworthiness as an Asset. GI Jahrestagung 2002: 429-429
19EEPekka Nikander, Jari Arkko: Delegation of Signalling Rights. Security Protocols Workshop 2002: 203-214
18EEJari Arkko, Pekka Nikander: Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties. Security Protocols Workshop 2002: 5-19
17EEPekka Nikander: Authorization and Charging in Public WLANs Using FreeBSD and 802.1x. USENIX Annual Technical Conference, FREENIX Track 2002: 109-119
16EEJari Arkko, Tuomas Aura, James Kempf, Vesa-Matti Mäntylä, Pekka Nikander, Michael Roe: Securing IPv6 neighbor and router discovery. Workshop on Wireless Security 2002: 77-86
2001
15EEPasi Eronen, Pekka Nikander: Decentralized Jini Security. NDSS 2001
14EEPekka Nikander: Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World. Security Protocols Workshop 2001: 12-21
13EEPekka Nikander: Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion). Security Protocols Workshop 2001: 22-26
2000
12 Tommi Elo, Pekka Nikander: Decentralized Authorization with ECDSA on a Java Smart Card. CARDIS 2000: 345-364
11EEChristian Gehrmann, Pekka Nikander: Securing ad hoc services, a Jini view: extended abstract. MobiHoc 2000: 135-136
10 Jussipekka Leiwo, Tuomas Aura, Pekka Nikander: Towards Network Denial of Service Resistant Protocols. SEC 2000: 301-310
9 Pekka Nikander, Lasse Metso: Policy and Trust in Open Multi-Operator Networks. SMARTNET 2000: 419-436
8EETuomas Aura, Pekka Nikander, Jussipekka Leiwo: DOS-Resistant Authentication with Client Puzzles. Security Protocols Workshop 2000: 170-177
7EEPekka Nikander, Kristiina Karvonen: Users and Trust in Cyberspace. Security Protocols Workshop 2000: 24-35
6EEPekka Nikander: Users and Trust in Cyberspace (Transcript of Discussion). Security Protocols Workshop 2000: 36-42
5EEPekka Nikander: An Operating System in Java for the Lego Mindstorms RCX Microcontroller. USENIX Annual Technical Conference, FREENIX Track 2000: 235-249
1999
4EEPekka Nikander, Jonna Partanen: Distributed Policy Management for JDK 1.2. NDSS 1999
3EEPekka Nikander, Yki Kortesniemi, Jonna Partanen: Preserving Privacy in Distributed Delegation with Fast Certificates. Public Key Cryptography 1999: 136-153
1998
2EEIlari Lehti, Pekka Nikander: Certifying Trust. Public Key Cryptography 1998: 83-98
1997
1 Tuomas Aura, Pekka Nikander: Stateless connections. ICICS 1997: 87-97

Coauthor Index

1Jari Arkko [16] [18] [19] [22] [30]
2Tuomas Aura [1] [8] [10] [16] [28]
3Matt Blaze [23]
4Gonzalo Camarillo [28] [32]
5Tommi Elo [12]
6Pasi Eronen [15]
7Christian Gehrmann [11]
8Andrei Gurtov [31]
9John Ioannidis [23]
10Sotiris Ioannidis [23]
11Kristiina Karvonen [7]
12James Kempf [16]
13Angelos D. Keromytis [23]
14Yki Kortesniemi [3]
15Dmitry Korzun [31]
16Ilari Lehti [2]
17Jussipekka Leiwo [8] [10]
18Andrey Lukyanenko [31]
19Vesa-Matti Mäntylä [16]
20Ignacio Mas [32]
21Jan Melén [27]
22Lasse Metso [9]
23Mats Näslund [30]
24Jonna Partanen [3] [4]
25Vassilis Prevelakis [23]
26Michael Roe [16]
27Vesa Torvinen [27]
28Jorma Wall [24]
29Jukka Ylitalo [24] [25] [27]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)