Jukka Ylitalo

According to our database1, Jukka Ylitalo authored at least 17 papers between 2002 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Towards Building an Automated Security Compliance Tool for the Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Use of Partial Least Squares as a Theory Testing Tool - an Analysis of Information Systems Papers.
Proceedings of the 20th European Conference on Information Systems, 2012

2011
PLS marker variable approach to diagnosing and controlling for method variance.
Proceedings of the International Conference on Information Systems, 2011

OpenID authentication as a service in OpenStack.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Tutorial: Applying Statistical Research Methods in Software Business.
Proceedings of the Software Business - First International Conference, 2010

Construct Validity in Partial Least Squares Path Modeling.
Proceedings of the International Conference on Information Systems, 2010

2008
Secure mobility at multiple granularity levels over heterogeneous datacom networks.
PhD thesis, 2008

An Experimental Evaluation of a HIP Based Network Mobility Scheme.
Proceedings of the Wired/Wireless Internet Communications, 6th International Conference, 2008

2005
SPINAT: Integrating IPsec into Overlay Routing.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Traversing Middleboxes with the Host Identity Protocol.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
BLIND: A Complete Identity Protection Framework for End-Points.
Proceedings of the Security Protocols, 2004

BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Re-thinking Security in IP Based Micro-Mobility.
Proceedings of the Information Security, 7th International Conference, 2004

Weak Context Establishment Procedure for Mobility and Multi-Homing Management.
Proceedings of the Communications and Multimedia Security, 2004

2003
Integrating Security, Mobility and Multi-Homing in a HIP Way.
Proceedings of the Network and Distributed System Security Symposium, 2003

Dynamic Network Interface Selection in Multihomed Mobile Hosts.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
End-point Identifiers in Secure Multi-homed Mobility.
Proceedings of the Procedings of the 6th International Conference on Principles of Distributed Systems. OPODIS 2002, 2002


  Loading...