Cryptographically generated addresses (CGA) T Aura International Conference on Information Security, 29-43, 2003 | 974 | 2003 |
DOS-resistant authentication with client puzzles T Aura, P Nikander, J Leiwo International workshop on security protocols, 170-177, 2000 | 568 | 2000 |
Scanning electronic documents for personally identifiable information T Aura, TA Kuhn, M Roe Proceedings of the 5th ACM workshop on Privacy in electronic society, 41-50, 2006 | 232 | 2006 |
Mobile IP version 6 route optimization security design background P Nikander, J Arkko, T Aura, G Montenegro, E Nordmark draft-ietf-mip6-ro-sec-03 (work in progress), 2005 | 232 | 2005 |
Authentication method T Aura US Patent 6,711,400, 2004 | 226 | 2004 |
Stateless connections T Aura, P Nikander International Conference on Information and Communications Security, 87-97, 1997 | 157 | 1997 |
Strategies against replay attacks T Aura Proceedings 10th Computer Security Foundations Workshop, 59-68, 1997 | 139 | 1997 |
Towards network denial of service resistant protocols J Leiwo, T Aura, P Nikander IFIP International Information Security Conference, 301-310, 2000 | 127 | 2000 |
Distributed access-rights management with delegation certificates T Aura Secure Internet Programming, 211-235, 1999 | 123 | 1999 |
Practical invisibility in digital communication T Aura International Workshop on Information Hiding, 265-278, 1996 | 119 | 1996 |
Securing IPv6 neighbor and router discovery J Arkko, T Aura, J Kempf, VM Mäntylä, P Nikander, M Roe Proceedings of the 1st ACM workshop on Wireless security, 77-86, 2002 | 100 | 2002 |
Spook in your network: Attacking an sdn with a compromised openflow switch M Antikainen, T Aura, M Särelä Nordic Conference on Secure IT Systems, 229-244, 2014 | 98 | 2014 |
Forwarding anomalies in Bloom filter-based multicast M Särelä, CE Rothenberg, T Aura, A Zahemszky, P Nikander, J Ott 2011 Proceedings IEEE INFOCOM, 2399-2407, 2011 | 98 | 2011 |
Mobile authentication system with reduced authentication delay AT Aura US Patent 6,947,725, 2005 | 89 | 2005 |
Human input security codes T Aura, M Roe US Patent 7,610,487, 2009 | 87 | 2009 |
On the structure of delegation networks T Aura Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998 | 82 | 1998 |
Time processes for time Petri nets T Aura, J Lilius International Conference on Application and Theory of Petri Nets, 136-155, 1997 | 76 | 1997 |
Using time to determine a hash extension T Aura, M Roe US Patent 7,624,264, 2009 | 73 | 2009 |
Analysis of the HIP base exchange protocol T Aura, A Nagarajan, A Gurtov Australasian Conference on Information Security and Privacy, 481-493, 2005 | 72 | 2005 |
Using conservation of flow as a security mechanism in network protocols JR Hughes, T Aura, M Bishop Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 132-141, 2000 | 72 | 2000 |