Name
Papers
Collaborators
TUOMAS AURA
80
112
Citations 
PageRank 
Referers 
552
77.28
1216
Referees 
References 
1259
635
Search Limit
1001000
Title
Citations
PageRank
Year
Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols00.342021
Transparency Of Sim Profiles For The Consumer Remote Sim Provisioning Protocol00.342021
Credential Provisioning and Device Configuration with EAP00.342021
XSS Vulnerabilities in Cloud-Application Add-Ons.00.342020
Formal verification of misbinding attacks on secure device pairing and bootstrapping00.342020
Evaluation of Out-of-Band Channels for IoT Security.00.342020
Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB.00.342020
XSS Vulnerabilities in Cloud-Application Add-Ons00.342020
Misbinding Attacks on Secure Device Pairing.00.342019
Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet00.342019
Misbinding Attacks on Secure Device Pairing and Bootstrapping.00.342019
Misbinding Attacks on Secure Device Pairing and Bootstrapping.10.352019
Analysis Of Topology Poisoning Attacks In Software-Defined Networking00.342019
Client-Side Vulnerabilities In Commercial Vpns00.342019
Watch your step! Detecting stepping stones in programmable networks00.342019
Application of Public Ledgers to Revocation in Distributed Access Control.00.342018
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure00.342018
Automated analysis of freeware installers promoted by download portals.00.342018
GPASS: A Password Manager with Group-Based Access Control.00.342017
SynAPTIC: Secure And Persistent connecTIvity for Containers.10.362017
Malware distributions and graph structure of the Web.00.342017
A Large-Scale Analysis of Download Portals and Freeware Installers.00.342017
Correlating file-based malware graphs against the empirical ground truth of DNS graphs.10.362016
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study.20.362016
We know where you are!40.632016
The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs10.362016
A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.00.342016
Secure and low-power authentication for resource-constrained devices10.342015
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access00.342015
Flexible Management of Cloud-Connected Digital Signage00.342015
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access50.832015
Domain Isolation in a Multi-tenant Software-Defined Network10.352015
Electronic Citizen Identities and Strong Authentication.10.432015
Commitment-Based Device Pairing With Synchronized Drawing70.462014
MoCHA: Augmenting pervasive displays through mobile devices and web-based technologies80.662014
Logout in single sign-on systems: Problems and solutions20.392014
Secure bootstrapping of cloud-managed ubiquitous displays50.492014
Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch.180.832014
Adaptive and context-aware privacy preservation exploiting user interactions in smart environments.100.542014
Denial-of-Service Mitigation for Internet Services.30.422014
Logout in Single Sign-on Systems.30.412013
Strong authentication with mobile phone20.382012
Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers201.242012
Applicability analysis of grid security mechanisms on cloud networking.00.342011
Performance analysis of HIP diet exchange for WSN security establishment.120.862011
Forwarding anomalies in Bloom filter-based multicast291.162011
Security Analysis of Leap-of-Faith Protocols.10.382011
Symbian OS Platform Security Model.00.342010
Can hand-held computers still be better smart cards?40.492010
How to share your favourite search results while preserving privacy and quality50.402010
  • 1
  • 2