Hannes Salin
Orcid: 0000-0001-6327-3565
According to our database1,
Hannes Salin
authored at least 25 papers
between 2020 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
A Comparative Analysis of Anonymous and Non-Anonymous Authorization Architectures for IoT Environments in Cooperative Intelligent Transport Systems.
Proceedings of the 10th International Conference on Internet of Things, 2025
Building a Decision Landscape Model for Software Development: From Empirical Insights to Formal Theory.
Proceedings of the 20th International Conference on Software Technologies, 2025
2024
Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
Proceedings of the 23rd IEEE International Conference on Trust, 2024
The Game of One More Idea: Gamification of Managerial Group Decision-Making in Software Engineering.
Proceedings of the 19th International Conference on Software Technologies, 2024
Small Mistakes with Big Impacts: A Study on Secure Coding Practices in Java Open Source Projects.
Proceedings of the Risks and Security of Internet and Systems, 2024
2023
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems.
J. Cybersecur. Priv., September, 2023
Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-Stamping.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
A Stochastic Approach Based on Rational Decision-Making for Analyzing Software Engineering Project Status.
Proceedings of the Product-Focused Software Process Improvement, 2023
Proceedings of the Information Security Practice and Experience, 2023
AccA: A Decentralized and Accumulator-Based Authentication and Authorization Architecture for Autonomous IoT in Connected Infrastructures.
Proceedings of the 8th International Conference on Internet of Things, 2023
The Power of Scrum Mastery: An Analysis of Agile Team Performance and Scrum Master Influence.
Proceedings of the 18th International Conference on Software Technologies, 2023
Thrifty Guardians: Overcoming the Challenges of Establishing Security Champions on a Limited Budget.
Proceedings of the 49th Euromicro Conference on Software Engineering and Advanced Applications, 2023
2022
Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams.
J. Cybersecur. Priv., April, 2022
Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments.
Proceedings of the IEEE International Conference on Trust, 2022
Quality Metrics for Software Development Management and Decision Making: An Analysis of Attitudes and Decisions.
Proceedings of the Product-Focused Software Process Improvement, 2022
An Authenticated Accumulator Scheme for Secure Master Key Access in Microservice Architectures.
Proceedings of the 7th International Conference on Internet of Things, 2022
Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intelligent Transport Systems.
Proceedings of the Risks and Security of Internet and Systems, 2022
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022
2021
Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021
Proceedings of the Risks and Security of Internet and Systems, 2021
2020
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020