Hannes Salin

Orcid: 0000-0001-6327-3565

According to our database1, Hannes Salin authored at least 18 papers between 2020 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems.
J. Cybersecur. Priv., September, 2023

A Stochastic Approach Based on Rational Decision-Making for Analyzing Software Engineering Project Status.
Proceedings of the Product-Focused Software Process Improvement, 2023

A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS).
Proceedings of the Information Security Practice and Experience, 2023

AccA: A Decentralized and Accumulator-Based Authentication and Authorization Architecture for Autonomous IoT in Connected Infrastructures.
Proceedings of the 8th International Conference on Internet of Things, 2023

The Power of Scrum Mastery: An Analysis of Agile Team Performance and Scrum Master Influence.
Proceedings of the 18th International Conference on Software Technologies, 2023

Thrifty Guardians: Overcoming the Challenges of Establishing Security Champions on a Limited Budget.
Proceedings of the 49th Euromicro Conference on Software Engineering and Advanced Applications, 2023

2022
Towards Agile Cybersecurity Risk Management for Autonomous Software Engineering Teams.
J. Cybersecur. Priv., April, 2022

Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments.
Proceedings of the IEEE International Conference on Trust, 2022

Quality Metrics for Software Development Management and Decision Making: An Analysis of Attitudes and Decisions.
Proceedings of the Product-Focused Software Process Improvement, 2022

An Authenticated Accumulator Scheme for Secure Master Key Access in Microservice Architectures.
Proceedings of the 7th International Conference on Internet of Things, 2022

Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intelligent Transport Systems.
Proceedings of the Risks and Security of Internet and Systems, 2022

How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

2021
Mission Impossible: Securing Master Keys.
CoRR, 2021

Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Authenticated Multi-proxy Accumulation Schemes for Delegated Membership Proofs.
Proceedings of the Risks and Security of Internet and Systems, 2021

2020
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020


  Loading...