Jari Arkko

According to our database1, Jari Arkko authored at least 75 papers between 1987 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Report from the IAB Workshop on Environmental Impact of Internet Applications and Systems, 2022.
RFC, February, 2024

2023
Considerations on Application - Network Collaboration Using Path Signals.
RFC, July, 2023

2022
Building Power-Efficient Constrained Application Protocol (CoAP) Devices for Cellular Networks.
RFC, May, 2022

2021
Nameservers for the Address and Routing Parameter Area ("arpa") Domain.
RFC, October, 2021

Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA').
RFC, October, 2021

Report from the IAB COVID-19 Network Impacts Workshop 2020.
RFC, July, 2021

Uniform Resource Names for Device Identifiers.
RFC, June, 2021

Report from the IAB Workshop on Design Expectations vs. Deployment Reality in Protocol Development.
RFC, February, 2021

2020
IETF Administrative Support Activity 2.0: Update to the Process for Selection of Trustees for the IETF Trust.
RFC, February, 2020

Update to the Process for Selection of Trustees for the IETF Trust.
RFC, February, 2020

Benchmarking Q-Learning Methods for Intelligent Network Orchestration in the Edge.
Proceedings of the 2nd 6G Wireless Summit, 2020

2019
Update to the Telephony Routing over IP (TRIP) IANA Registry Rules regarding Postal Addresses.
RFC, July, 2019

2018
Sensor Measurement Lists (SenML).
RFC, August, 2018

Practical Considerations and Implementation Experiences in Securing Smart Object Networks.
RFC, May, 2018

2017
Host Multihoming with the Host Identity Protocol.
RFC, February, 2017

Host Mobility with the Host Identity Protocol.
RFC, February, 2017

2015
Distributed Prefix Assignment Algorithm.
RFC, November, 2015

OSPFv3 Autoconfiguration.
RFC, April, 2015

Architectural Considerations in Smart Object Networking.
RFC, March, 2015

A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
IPv6 Home Networking Architecture Principles.
RFC, October, 2014

2013
IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts.
RFC, November, 2013

Some Measurements on World IPv6 Day from an End-User Perspective.
RFC, July, 2013

2012
Diameter Base Protocol.
RFC, October, 2012

Scalable Operation of Address Translators with Per-Interface Bindings.
RFC, June, 2012

Experiences from an IPv6-Only Network.
RFC, April, 2012

Report from the Smart Object Workshop.
RFC, April, 2012

End-to-end security for sleepy smart object networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2011
IANA Rules for MIKEY (Multimedia Internet KEYing).
RFC, August, 2011

Mobility Support in IPv6.
RFC, July, 2011

Guidelines for Using IPv6 Transition Mechanisms during IPv6 Deployment.
RFC, May, 2011

IPv4 Run-Out and IPv4-IPv6 Co-Existence Scenarios.
RFC, May, 2011

2010
IANA Rules for the Protocol for Carrying Authentication for Network Access (PANA).
RFC, May, 2010

IANA Allocation Guidelines for the IPv6 Routing Header.
RFC, May, 2010

IPv4 Address Blocks Reserved for Documentation.
RFC, January, 2010

2009
Failure Detection and Locator Pair Exploration Protocol for IPv6 Multihoming.
RFC, June, 2009

Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA').
RFC, May, 2009

IANA Allocation Guidelines for the Address Resolution Protocol (ARP).
RFC, April, 2009

Dagstuhl perspectives workshop on end-to-end protocols for the future internet.
Comput. Commun. Rev., 2009

09102 Report - Perspectives Workshop: Naming and Addressing in a Future Internet.
Proceedings of the Perspectives Workshop: Naming and Addressing in a Future Internet, 01.03., 2009

09102 Abstracts Collection - Perspectives Workshop: Naming and Addressing in a Future Internet.
Proceedings of the Perspectives Workshop: Naming and Addressing in a Future Internet, 01.03., 2009

2008
End-Host Mobility and Multihoming with the Host Identity Protocol.
RFC, April, 2008

IANA Allocation Guidelines for the Protocol Field.
RFC, February, 2008

Network Discovery and Selection Problem.
RFC, January, 2008

2007
Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs).
RFC, July, 2007

Enhanced Route Optimization for Mobile IPv6.
RFC, May, 2007

A Taxonomy and Analysis of Enhancements to Mobile IPv6 Route Optimization.
RFC, February, 2007

2006
Cryptographically Generated Addresses (CGA) Extension Field Format.
RFC, October, 2006

Key Management Extensions for Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP).
RFC, July, 2006

Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA).
RFC, January, 2006

A Node Identity Internetworking Architecture.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
The Network Access Identifier.
RFC, December, 2005

Mobile IP Version 6 Route Optimization Security Design Background.
RFC, December, 2005

Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2.
RFC, November, 2005

SEcure Neighbor Discovery (SEND).
RFC, March, 2005

Enhancing Privacy with Shared Pseudo Random Sequences.
Proceedings of the Security Protocols, 2005

2004
MIKEY: Multimedia Internet KEYing.
RFC, August, 2004

Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents.
RFC, June, 2004

Mobile IPv6 Security.
Wirel. Pers. Commun., 2004

Authentication Components: Engineering Experiences and Guidelines.
Proceedings of the Security Protocols, 2004

2003
Diameter Base Protocol.
RFC, September, 2003

Internet Protocol Version 6 (IPv6) for Some Second and Third Generation Cellular Hosts.
RFC, April, 2003

Security Mechanism Agreement for the Session Initiation Protocol (SIP).
RFC, January, 2003

Limitations of IPsec Policy Mechanisms.
Proceedings of the Security Protocols, 2003

Limitations of IPsec Policy Mechanisms (Discussion).
Proceedings of the Security Protocols, 2003

2002
Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA).
RFC, September, 2002

Securing IPv6 neighbor and router discovery.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

Delegation of Signalling Rights.
Proceedings of the Security Protocols, 2002

Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.
Proceedings of the Security Protocols, 2002

Security of Internet Location Management.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2000
Introduction to Accounting Management.
RFC, October, 2000

1993
On the Existence and Production of State Identification Machines for Labelled Transition Systems.
Proceedings of the Formal Description Techniques, VI, Proceedings of the IFIP TC6/WG6.1 Sixth International Conference on Formal Description Techniques, 1993

1990
Supporting testing of specifications and implementations.
Microprocessing and Microprogramming, 1990

1989
XE design rationale: Clu revisited.
ACM SIGPLAN Notices, 1989

1987
XC - A Language for Embedded Rule Based Systems.
ACM SIGPLAN Notices, 1987


  Loading...