Philip Ginzboorg
  • Phone+358 50 4836224
  • Otakaari 5

1996 …2024

Research activity per year

Filter
Conference article in proceedings

Search results

  • 2024

    Attestation with Constrained Relying Party

    Moustafa, M., Niemi, A., Ginzboorg, P. & Ekberg, J. E., 2024, Proceedings of the 10th International Conference on Information Systems Security and Privacy. Lenzini, G., Mori, P. & Furnell, S. (eds.). SciTePress, p. 701-708 8 p. (International Conference on Information Systems Security and Privacy; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    10 Downloads (Pure)
  • 2022

    AKMA for Secure Multi-access Edge Computing Mobility in 5G

    Akman, G., Ginzboorg, P. & Niemi, V., 2022, Computational Science and Its Applications- ICCSA 2022 Workshops, Proceedings. Gervasi, O., Murgante, B., Misra, S., Rocha, A. M. A. C. & Garau, C. (eds.). Springer, p. 432-449 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13380 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Trusted Hart for Mobile RISC-V Security

    Ushakov, V., Sovio, S., Qi, Q., Nayani, V., Manea, V., Ginzboorg, P. & Ekberg, J. E., 2022, Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022. IEEE, p. 1587-1596 10 p. (IEEE International Conference on Trust, Security and Privacy in Computing and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • 2021

    Credential Provisioning and Device Configuration with EAP

    Boire, S., Akgün, T., Ginzboorg, P., Laitinen, P., Tamrakar, S. & Aura, T., 22 Nov 2021, MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access. New York, NY, USA: ACM, p. 87–96 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    158 Downloads (Pure)
  • Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications

    Akman, G., Ginzboorg, P. & Niemi, V., 10 Sept 2021, Computational Science and Its Applications – ICCSA 2021 : 21st International Conference, Cagliari, Italy, September 13–16, 2021, Proceedings, Part VIII. Gervasi, O., Murgante, B., Misra, S., Garau, C., Blečić, I., Taniar, D., Apduhan, B. O., Rocha, A. M., Tarantino, E. & Torre, C. M. (eds.). Springer, p. 44-59 16 p. (Lecture Notes in Computer Science; vol. 12956 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • 2019

    AKMA Support in Multi SIM User Equipment

    Akman, G., Niemi, V. & Ginzboorg, P., 1 Nov 2019, Proceedings of the 25th Conference of Open Innovations Association FRUCT, FRUCT 2019. Niemi, V. & Tyutina, T. (eds.). IEEE, p. 15-24 10 p. 8981494. (Conference of Open Innovation Association, FRUCT).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Privacy preserving AKMA in 5G

    Khan, M., Ginzboorg, P. & Niemi, V., 11 Nov 2019, SSR 2019 - Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop. ACM, p. 45-56 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    4 Citations (Scopus)
  • 2018

    Defeating the downgrade attack on identity privacy in 5G

    Khan, M., Ginzboorg, P., Järvinen, K. & Niemi, V., 1 Jan 2018, Security Standardisation Research - 4th International Conference, SSR 2018, Proceedings. Cremers, C. & Lehmann, A. (eds.). Springer, p. 95-119 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11322 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    18 Citations (Scopus)
    284 Downloads (Pure)
  • Estimating Message Transmission Time over Heterogeneous Disrupted Links

    Ginzboorg, P., Niemi, V. & Ott, J., 24 Aug 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018. United States: IEEE, Vol. 2018-June. 8446038. (IEEE International Workshop on Signal Processing Advances in Wireless Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • IMSI-based Routing and Identity Privacy in 5G

    Khan, M., Niemi, V. & Ginzboorg, P., 2018, FRUCT'22: Proceedings of the 22st Conference of Open Innovations Association FRUCT. FRUCT, p. 338 - 343 48

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientific

  • 2017

    On De-synchronization of User Pseudonyms in Mobile Networks

    Khan, M., Järvinen, K., Ginzboorg, P. & Niemi, V., 2017, Information Systems Security. ICISS 2017: 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings. Shyamasundar, R., Singh, V. & Vaidya, J. (eds.). Springer, p. 347-366 (Lecture Notes in Computer Science; vol. 10717).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • 2016

    Privacy of the Long-Term Identities in Cellular Networks

    Ginzboorg, P. & Niemi, V., 12 Dec 2016, 2nd International Workshop on 5G Security (IW5GS 2016), 19 June 2016, Xi'an, China. ACM, 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2015

    From the rigid hierarchical to flexible flow-based 5G architecture: dimensioning issues

    Krendzel, A. & Ginzboorg, P., 2015, The 6th International Conference On Network of the Future (NoF 2015), Montreal, QC, Canada, Sep. 30 Oct. 2, 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
  • 2014

    Expected Penetration Rate of 5G Mobile Users by 2020: A Case Study

    Krendzel, A. & Ginzboorg, P., 2014, The Fourth International Conference on Mobile Services, Resources, and Users. MOBILITY 2014: July 20-24, 2014, Paris, France. IARIA XPS Press, p. 78-81

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2013

    Inferring Social Ties in Academic Networks Using Short-Range Wireless Communication

    Bilogrevic, I., Huguenin, K., Jadliwala, M., Lopez, F., Hubaux, J.-P., Ginzboorg, P. & Niemi, V., 2013, ACM Workshop on Privacy in the Electronic Society (WPES), Berlin, Germany, November 4 2013.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    16 Citations (Scopus)
  • 2012

    Big Brother Knows Your Friends: on Privacy of Social Communities in Pervasive Networks

    Bilogrevic, I., Jadliwala, M., Lam, I., Aad, I., Ginzboorg, P., Niemi, V., Bindschaedler, L. & Hubaux, J.-P., 2012, 10th International Conference on Pervasive Computing (PERVASIVE 2012), Newcastle, UK,June 18-22, 2012. Springer Gabler , p. .

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    6 Citations (Scopus)
  • Message fragmentation for a chain of disrupted links

    Ginzboorg, P., Niemi, V. & Ott, J., 2012, IEEE WoWMoM workshop on Autonomous and Opportunistic Communication (AOC), San Francisco, California, USA June 25-28, 2012.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
  • Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks

    Bindschaedler, L., Jadliwala, M., Bilogrevic, I., Aad, I., Ginzboorg, P., Niemi, V. & Hubaux, J.-P., 2012, 19th Annual Network & Distributed System Security Symposium (NDSS 2012), San Diego, USA, 5-8 February 2012. p. .

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2011

    Best-effort authentication for opportunistic networks

    Solis, J., Ginzboorg, P., Asokan, N. & Ott, J., 2011, IPCCC 30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011, Orlando, FL, 17 November 2011 - 19 November 2011.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    3 Citations (Scopus)
  • Message Fragmentation for Disrupted Links

    Ginzboorg, P., Niemi, V. & Ott, J., 2011, EW 17th European Wireless Conference, Vienna, Austria, April 27-29, 2011.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    4 Citations (Scopus)
  • 2010

    DTM Communication in a Mine

    Ginzboorg, P., Kärkkäinen, T., Ruotsalainen, A., Andersson, M. & Ott, J., 2010, 2nd Extreme Workshop on Communications Dharamsala, India, 4-10 September, 2010. p. .

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • DTN Communication in a Mine

    Ginzboorg, P., Kärkkäinen, T., Ruotsalainen, A., Andersson, M. & Ott, J., 2010, 2nd Extreme Workshop on Communication (ExtremeCom).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2007

    Applicability of identity-based cryptography for disruption-tolerant networking

    Asokan, N., Kostiainen, K., Ginzboorg, P., Ott, J. & Luo, C., 2007, MobiOpp'07: Proceedings of the First International MobiSys Workshop on Mobile Opportunistic Networking. ACM, p. 52-56 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    68 Citations (Scopus)
  • 2005

    Extending cellular authentication as a service

    Laitinen, P., Ginzboorg, P., Asokan, N., Holtmanns, S. & Niemi, V., 2005, 1st IEE International Conference on Commercialising Technology and Innovation.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • Security for interactions in pervasive networks: Applicability of recommendation systems

    Moloney, S. & Ginzboorg, P., 2005, Security in Ad-hoc and Sensor Networks : First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers. Springer, Vol. 3313. p. 95-106 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    4 Citations (Scopus)
  • Visitor access management in personal wireless networks

    Asokan, N., Moloney, S., Ginzboorg, P. & Kostiainen, K., 2005, Proceedings - Seventh IEEE International Symposium on Multimedia, ISM 2005. IEEE, p. 686-693 8 p. 1565902

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
  • 1998

    Charging for broadband access

    Ginzboorg, P., Ekberg, J.-E., Laitinen, P. & Ylä-Jääski, A., 1998, 1st International Conference on Telecommunications and Electronic Commerce (ICTEC).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Your message has successfully been sent.
Your message was not sent due to an error.