| 2008 |
| 32 | EE | Gonzalo Camarillo,
Ignacio Mas,
Pekka Nikander:
A Framework to Combine the Session Initiation Protocol and the Host Identity Protocol.
WCNC 2008: 3051-3056 |
| 31 | EE | Andrei Gurtov,
Dmitry Korzun,
Andrey Lukyanenko,
Pekka Nikander:
Hi3: An efficient and secure networking architecture for mobile hosts.
Computer Communications 31(10): 2457-2467 (2008) |
| 2005 |
| 30 | EE | Jari Arkko,
Pekka Nikander,
Mats Näslund:
Enhancing Privacy with Shared Pseudo Random Sequences.
Security Protocols Workshop 2005: 187-196 |
| 29 | EE | Pekka Nikander:
Enhancing Privacy with Shared Pseudo Random Sequences.
Security Protocols Workshop 2005: 197-203 |
| 2004 |
| 28 | EE | Tuomas Aura,
Pekka Nikander,
Gonzalo Camarillo:
Effects of Mobility and Multihoming on Transport-Protocol Security.
IEEE Symposium on Security and Privacy 2004: 12-26 |
| 27 | EE | Jukka Ylitalo,
Jan Melén,
Pekka Nikander,
Vesa Torvinen:
Re-thinking Security in IP Based Micro-Mobility.
ISC 2004: 318-329 |
| 26 | EE | Pekka Nikander:
Applying Host Identity Protocol to the Internet Addressing Architecture.
SAINT 2004: 5 |
| 25 | EE | Jukka Ylitalo,
Pekka Nikander:
BLIND: A Complete Identity Protection Framework for End-Points.
Security Protocols Workshop 2004: 163-176 |
| 2003 |
| 24 | EE | Pekka Nikander,
Jukka Ylitalo,
Jorma Wall:
Integrating Security, Mobility and Multi-Homing in a HIP Way.
NDSS 2003 |
| 23 | EE | Matt Blaze,
John Ioannidis,
Sotiris Ioannidis,
Angelos D. Keromytis,
Pekka Nikander,
Vassilis Prevelakis:
TAPI: Transactions for Accessing Public Infrastructure.
PWC 2003: 90-100 |
| 22 | EE | Jari Arkko,
Pekka Nikander:
Limitations of IPsec Policy Mechanisms.
Security Protocols Workshop 2003: 241-251 |
| 2002 |
| 21 | | Pekka Nikander:
Trustworthiness as an Asset.
GI Jahrestagung 2002: 100-105 |
| 20 | | Pekka Nikander:
Trustworthiness as an Asset.
GI Jahrestagung 2002: 429-429 |
| 19 | EE | Pekka Nikander,
Jari Arkko:
Delegation of Signalling Rights.
Security Protocols Workshop 2002: 203-214 |
| 18 | EE | Jari Arkko,
Pekka Nikander:
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.
Security Protocols Workshop 2002: 5-19 |
| 17 | EE | Pekka Nikander:
Authorization and Charging in Public WLANs Using FreeBSD and 802.1x.
USENIX Annual Technical Conference, FREENIX Track 2002: 109-119 |
| 16 | EE | Jari Arkko,
Tuomas Aura,
James Kempf,
Vesa-Matti Mäntylä,
Pekka Nikander,
Michael Roe:
Securing IPv6 neighbor and router discovery.
Workshop on Wireless Security 2002: 77-86 |
| 2001 |
| 15 | EE | Pasi Eronen,
Pekka Nikander:
Decentralized Jini Security.
NDSS 2001 |
| 14 | EE | Pekka Nikander:
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.
Security Protocols Workshop 2001: 12-21 |
| 13 | EE | Pekka Nikander:
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion).
Security Protocols Workshop 2001: 22-26 |
| 2000 |
| 12 | | Tommi Elo,
Pekka Nikander:
Decentralized Authorization with ECDSA on a Java Smart Card.
CARDIS 2000: 345-364 |
| 11 | EE | Christian Gehrmann,
Pekka Nikander:
Securing ad hoc services, a Jini view: extended abstract.
MobiHoc 2000: 135-136 |
| 10 | | Jussipekka Leiwo,
Tuomas Aura,
Pekka Nikander:
Towards Network Denial of Service Resistant Protocols.
SEC 2000: 301-310 |
| 9 | | Pekka Nikander,
Lasse Metso:
Policy and Trust in Open Multi-Operator Networks.
SMARTNET 2000: 419-436 |
| 8 | EE | Tuomas Aura,
Pekka Nikander,
Jussipekka Leiwo:
DOS-Resistant Authentication with Client Puzzles.
Security Protocols Workshop 2000: 170-177 |
| 7 | EE | Pekka Nikander,
Kristiina Karvonen:
Users and Trust in Cyberspace.
Security Protocols Workshop 2000: 24-35 |
| 6 | EE | Pekka Nikander:
Users and Trust in Cyberspace (Transcript of Discussion).
Security Protocols Workshop 2000: 36-42 |
| 5 | EE | Pekka Nikander:
An Operating System in Java for the Lego Mindstorms RCX Microcontroller.
USENIX Annual Technical Conference, FREENIX Track 2000: 235-249 |
| 1999 |
| 4 | EE | Pekka Nikander,
Jonna Partanen:
Distributed Policy Management for JDK 1.2.
NDSS 1999 |
| 3 | EE | Pekka Nikander,
Yki Kortesniemi,
Jonna Partanen:
Preserving Privacy in Distributed Delegation with Fast Certificates.
Public Key Cryptography 1999: 136-153 |
| 1998 |
| 2 | EE | Ilari Lehti,
Pekka Nikander:
Certifying Trust.
Public Key Cryptography 1998: 83-98 |
| 1997 |
| 1 | | Tuomas Aura,
Pekka Nikander:
Stateless connections.
ICICS 1997: 87-97 |