Tuomas Aura

Professor

Research outputs

  1. 2010
  2. Published

    How to share your favourite search result while preserving privacy and quality

    Danezis, G., Aura, T., Shuo, C. & Kiciman, E., 2010, Privacy Enhancing Technologies Symposium (PETS2010), Waterloo, Canada, July 2010. p. 273-290

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. Published

    Symbian OS Platform Security Model

    Li, B., Reshetova, E. & Aura, T., 2010, In : ;login: The USENIX Magazine. 35, 4

    Research output: Contribution to journalArticleScientific

  4. 2009
  5. Published

    Privacy-preserving 802.11 access-point discovery

    Lindqvist, J., Aura, T., Danezis, G., Koponen, T., Myllyniemi, A., Mäki, J. & Roe, M., 2009, ACM conference on Wireless network security (WiSec). David Basin, S. C. (ed.). New York, NY, USA: ACM, p. 123-130

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  6. 2008
  7. Published

    Chattering Laptops

    Aura, T., Lindqvist, J., Roe, M. & Mohammed, A., 2008, 8th Privacy Enhancing Technologies Symposium (PETS) Leuven, Belgium, July 23-25, 2008.. Springer Berlin / Heidelberg, Germany, p. 167-186

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  8. 2005
  9. Published

    Analysis of the HIP Base Exchagne Protocol

    Aura, T., Nagarajan, A. & Gurtov, A., 2005, 10th Australasian Conference on Information Security and Privacy Brisbane, Australia Heinäkuussa 4-6 päivä, 2005. Colin Boyd, J. M. G. N. (ed.).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  10. Published

    Mobile IP version 6 route optimization security design background

    Nikander, P., Arkko, J., Aura, T., Montenegro, G. & Nordmark, E., 2005

    Research output: Other contributionProfessional

  11. 2004
  12. Published

    Effects of mobility and multihoming on transport-protocol security

    Aura, T., Nikander, P. & Camarillo, G., 16 Aug 2004, Proceedings - IEEE Symposium on Security and Privacy. Vol. 2004. p. 12-26 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  13. 2003
  14. Published

    Mobile IP version 6 (MIPv6) route optimization security design

    Nikander, P., Arkko, J., Aura, T. & Montenegr, G., 1 Dec 2003, IEEE Vehicular Technology Conference. 3 ed. IEEE, Vol. 58. p. 2004-2008 5 p. ( IEEE VTS Vehicular Technology Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  15. 2002
  16. Published

    Securing IPv6 neighbor and router discovery

    Arkko, J., Aura, T., Kempf, J., Mäntylä, V. M., Nikander, P. & Roe, M., 1 Dec 2002, Proceedings of the Workshop on Wireless Security. p. 77-86 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  17. Published

    Towards a Survivable Security Architecture for Ad-Hoc Networks

    Aura, T. & Mäki, S., 2002, 9th International Workshop on Security Protocols, Cambridge, UK, April 25-27, 2001. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 63-73

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  18. 2001
  19. Published

    DOS-Resistant Authentication with Client Puzzles

    Aura, T., Nikander, P. & Leiwo, J., 2001, 8th International Workshop on Security Protocols, Cambridge, UK, April 3-5, 2000. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 170-177

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  20. Published

    DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)

    Aura, T., 2001, 8th International Workshop on Security Protocols, Cambridge, UK, April 3-5, 2000. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Berlin, p. 178-181

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  21. 2000
  22. Published

    A causal semantics for time Petri nets

    Aura, T. & Lilius, J., 2000, In : Theoretical Computer Science. 243, 1-2, p. 409-447

    Research output: Contribution to journalArticleScientificpeer-review

  23. Published

    Analyzing single-server network inhibition

    Aura, T., Bishop, M. & Sniegowski, D., 2000, The 2000 IEEE Computer Security Foundations Workshop, Cambridge, UK, July 2000. Los Alamitos CA, USA, p. 108-117

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  24. Published

    Authorization and Availability - Aspects of Open Network Security

    Aura, T., 2000, Espoo, p. 42, (Helsinki University of Technology, Laboratory for Theoretical Computer Science, Research Reports; no. HUT-TCS-A64).

    Research output: Working paperProfessional

  25. Published

    Privacy and Accountability in Certificate Systems

    Aura, T. & Ellison, C., 2000, Espoo, p. 17, (Helsinki University of Technology, Laboratory for Theoretical Computer Science, Research Reports; no. HUT-TCS-A61).

    Research output: Working paperProfessional

  26. Published

    Robust Membership Management for Ad-hoc Groups

    Mäki, S., Aura, T. & Hietalahti, M., 2000, Thr 5th Nordic Workshop on Secure IT Systems, Reykjavik, Icleand, October 12-13, 2000. Erlingsson, U. (ed.). Reykjavik: Reykjavik University, p. 151-168

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  27. Published

    Using conservation of flow as a security mechanism in network protocols

    Hughes, J., Aura, T. & Bishop, M., 2000, The 2000 IEEE Symposium on Security and Privacy, Oakland CA, USA, May 2000. Los Alamitos CA, USA, p. 132-141

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  28. 1999
  29. Published

    Distributed access-rights management with delegation certificates

    Aura, T., 1999, Secure Internet Programming: Security Issues for Distributed and Mobile Objects. Vitek, J. & Jensen, C. (eds.). Berlin, p. 211-235

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  30. Published

    Software license management with smart cards

    Aura, T. & Gollmann, D., 1999, USENIX Workshop on Smartcard Technology, Chicago, May 1999. USENIX : THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 75-85

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  31. 1998
  32. Published

    Delegation-based access control for intelligent network services

    Aura, T., Koponen, P. & Räsänen, J., 1998, ECOOP Workshop on Distributed Object Security, Brussels, Belgium, July 1998. France: Unite de Recherche INRIA

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  33. Published

    Fast access control decisions from delegation certificate databases

    Aura, T., 1998, 3rd Australasian Conference on Information Security and Privacy ACISP '98, Brisbane, Australia, July 1998. Berlin, Heidelberg, p. 284-295

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  34. Published

    On the structure of delegation networks

    Aura, T., 1998, 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998. Los Alamitos, California, p. 14-26

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  35. 1997
  36. Published

    Comparison of graph-search algorithms for authorization verification in delegation networks

    Aura, T., 1997, NORDSEC'97. Espoo

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  37. Published

    On the structure of delegation networks Licentiate's Thesis

    Aura, T., 1997, Espoo, p. 53, (Series A: Research Reports; no. A48).

    Research output: Working paperProfessional

  38. Published

    Stateless connections

    Aura, T. & Nikander, P., 1997, Espoo, (Series A: Research Reports; no. A46).

    Research output: Working paperProfessional

  39. Published

    Stateless connections, in proceedings of International Conference on Information and Communications Security

    Aura, T. & Nikander, P., 1997, ICICS'97 Beijing, November 1997.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  40. Published

    Strategies against replay attacks

    Aura, T., 1997, 10th IEEE Computer Security Foundations Workshop. Rockport, Mass., USA, p. 59-68

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  41. Published

    Time processes of time Petri nets in proceedings

    Aura, T. & Lilius, J., 1997, 18th International Conference on Applications and Theory of Petri Nets. Toulouse, France, p. 136-155

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  42. Published

    Using multimodal logic to express conflicting interests in security protocols in proceedings of DIMACS Workshop on Design and formal verification of security protocols

    Huima, A. & Aura, T., 1997, DIMacs Workshop, New Jersey, 1997. New Jersey, USA

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  43. 1996
  44. Published

    Practical invisiblity in digital communication

    Aura, T., 1996, First International Workshop on Information Hiding, Cambridge UK. Cambridge, UK

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  45. Published

    Time Processes of Time Petri Nets

    Aura, T., 1996, Espoo, Otaniemi, p. 57, (Research Report; no. A38).

    Research output: Working paperProfessional

  46. 1995
  47. Published

    Modelling the Needham-Schröder Authentication Protocol with High Level Petri Nets

    Aura, T., 1995, Espoo, p. 32, (Digital Systems Laboratory; no. B14).

    Research output: Working paperProfessional

Previous 1 2 Next

ID: 43163