Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("AURA, Tuomas")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 23 of 23

  • Page / 1
Export

Selection :

  • and

Designing the mobile IPv6 security protocol : Network and information systems securityAURA, Tuomas; ROE, Michael.Annales des télécommunications. 2006, Vol 61, Num 3-4, pp 332-356, issn 0003-4347, 25 p.Article

Privacy, Control and Internet Mobility. Authors'replyAURA, Tuomas; BLAZE, Matt; CHRISTIANSON, Bruce et al.Lecture notes in computer science. 2006, pp 133-150, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 18 p.Conference Paper

Effects of mobility and multihoming on transport-protocol securityAURA, Tuomas; NIKANDER, Pekka; CAMARILLO, Gonzalo et al.IEEE symposium on security and privacy. 2004, pp 12-26, isbn 0-7695-2136-3, 1Vol, 15 p.Conference Paper

Authentication Components : Engineering Experiences and Guidelines. Authors' replyERONEN, Pasi; ARKKO, Jari; AURA, Tuomas et al.Lecture notes in computer science. 2006, pp 68-82, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 15 p.Conference Paper

Cryptographically generated addresses (CGA)AURA, Tuomas.Lecture notes in computer science. 2003, pp 29-43, issn 0302-9743, isbn 3-540-20176-9, 15 p.Conference Paper

Adaptive and context-aware privacy preservation exploiting user interactions in smart environments : Data Security and Privacy in Wireless NetworksPALLAPA, Gautham; DAS, Sajal K; DI FRANCESCO, Mario et al.Pervasive and mobile computing (Print). 2014, Vol 12, pp 232-243, issn 1574-1192, 12 p.Article

Logout in single sign-on systems: Problems and solutions : Identity Protection and ManagementSUORANTA, Sanna; MANZOOR, Kamran; TONTTI, Asko et al.Journal of information security and applications. 2014, Vol 19, Num 1, pp 61-77, 17 p.Article

One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. Authors' replySTAJANO, Frank; BLAZE, Matt; AURA, Tuomas et al.Lecture notes in computer science. 2006, pp 51-67, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 17 p.Conference Paper

Analysis of the HIP base exchange protocolAURA, Tuomas; NAGARAJAN, Aarthi; GURTOV, Andrei et al.Lecture notes in computer science. 2005, pp 481-493, issn 0302-9743, isbn 3-540-26547-3, 13 p.Conference Paper

Limits to Anonymity When Using Credentials. Authors' replyPASHALIDIS, Andreas; MITCHELL, Chris J; STAJANO, Frank et al.Lecture notes in computer science. 2006, pp 4-19, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 16 p.Conference Paper

Towards a Mechanism for Discretionary Overriding of Access Control. Authors' replyRISSANEN, Erik; SADIGHI FIROZABADI, Babak; SERGOT, Marek et al.Lecture notes in computer science. 2006, pp 312-323, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 12 p.Conference Paper

Protocols with certified-transfer servers. DiscussionYAHALOM, Raphael; MAO, Wenbo; MALCOLM, James et al.Lecture notes in computer science. 2003, pp 145-157, issn 0302-9743, isbn 3-540-20830-5, 13 p.Conference Paper

Encapsulating rules of prudent security engineering (position paper). DiscussionJÜRJENS, Jan; AURA, Tuomas; WHEELER, David et al.Lecture notes in computer science. 2002, pp 95-106, issn 0302-9743, isbn 3-540-44263-4, 12 p.Conference Paper

A proof of non-repudiation. DiscussionBELLA, Giampaolo; PAULSON, Lawrence C; LOMAS, Mark et al.Lecture notes in computer science. 2002, pp 119-133, issn 0302-9743, isbn 3-540-44263-4, 15 p.Conference Paper

A Cryptographic Framework for the Controlled Release of Certified Data. Authors' replyBANGERTER, Endre; CAMENISCH, Jan; DANEZIS, George et al.Lecture notes in computer science. 2006, pp 20-50, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 31 p.Conference Paper

Accountable Privacy. Authors' replyBURMESTER, Mike; DESMEDT, Yvo; SERJANTOV, Andrei et al.BURMESTER, Mike; SERJANTOV, Andrei et al.BURMESTER, Mike; Lecture notes in computer science. 2006, pp 83-105, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 23 p.Conference Paper

Privacy Is Linking Permission to Purpose. Authors' replyMASSACCI, Fabio; ZANNONE, Nicola; DANEZIS, George et al.Lecture notes in computer science. 2006, pp 179-198, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 20 p.Conference Paper

Mobile IPv6 security. DiscussionAURA, Tuomas; ANDERSON, Ross; BLAZE, Matt et al.Lecture notes in computer science. 2003, pp 215-234, issn 0302-9743, isbn 3-540-20830-5, 20 p.Conference Paper

Trust Management and whether to delegate. DiscussionFOLEY, Simon N; CHRISTIANSON, Bruce; NIKANDER, Pekka et al.Lecture notes in computer science. 2002, pp 151-165, issn 0302-9743, isbn 3-540-44263-4, 15 p.Conference Paper

DOS-resistant authentication with client puzzles. DiscussionAURA, Tuomas; NIKANDER, Pekka; LEIWO, Jussipekka et al.Lecture notes in computer science. 2001, pp 170-181, issn 0302-9743, isbn 3-540-42566-7Conference Paper

Controlling Who Tracks Me. Authors'replyBOHM, Denis; LAMMING, Mik; STAJANO, Frank et al.Lecture notes in computer science. 2006, pp 151-162, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 12 p.Conference Paper

PIM security. DiscussionGOLLMANN, Dieter; NIKANDER, Pekka; AURA, Tuomas et al.Lecture notes in computer science. 2002, pp 80-86, issn 0302-9743, isbn 3-540-44263-4, 7 p.Conference Paper

Towards a survivable security architecture for ad-hoc networks. DiscussionAURAL, Tuomas; MÄKI, Silja; KUHN, Markus et al.Lecture notes in computer science. 2002, pp 63-79, issn 0302-9743, isbn 3-540-44263-4, 17 p.Conference Paper

  • Page / 1