Jussipekka Leiwo

According to our database1, Jussipekka Leiwo authored at least 27 papers between 1997 and 2008.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
A unified architecture for a public key cryptographic coprocessor.
J. Syst. Archit., 2008

A Study on the Security of Privacy Homomorphism.
Int. J. Netw. Secur., 2008

2007
Private stateful circuits secure against probing attacks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
A technique for expressing IT security objectives.
Inf. Softw. Technol., 2006

FPGA based DPA-resistant Unified Architecture for Signcryption.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

The design of multiplierless FIR filters with a minimum adder step and reduced hardware complexity.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

An Efficient Algorithm for DPA-resistent RSA.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006

Hiding Circuit Topology from Unbounded Reverse Engineers.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Understanding and Communicating It Security Specifications with Uml.
Int. J. Softw. Eng. Knowl. Eng., 2005

Securely Utilizing External Computing Power.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Efficient high radix modular multiplication for high-speed computing in re-configurable hardware [cryptographic applications].
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

An Improved Secure Two-Party Computation Protocol.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2000
DOS-Resistant Authentication with Client Puzzles.
Proceedings of the Security Protocols, 2000

Disallowing Unauthorized State Changes of Distributed Shared Objects.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Towards Network Denial of Service Resistant Protocols.
Proceedings of the Information Security for Global Information Infrastructures, 2000

High Performance Agile Crypto Modules.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Encrypted Message Authentication by Firewalls.
Proceedings of the Public Key Cryptography, 1999

A Security Design for a Wide-Area Distributed System.
Proceedings of the Information Security and Cryptology, 1999

Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.
Proceedings of the Information Security and Cryptology, 1999

A Mechanism for Deriving Specifications of Security Functions in the CC Framework.
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999

Organizational Modeling for Efficient Specification of Information Security Requirements.
Proceedings of the Advances in Databases and Information Systems, 1999

1998
An Analysis of Ethics as Foundation of Information Security in Distributed Systems.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
A formal model to aid documenting and harmonizing of information security requirements.
Proceedings of the Information Security in Research and Business, 1997

Layered Protection of Availability.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997

A Framework for the Management of Information Security.
Proceedings of the Information Security, First International Workshop, 1997

A Method to Implement a Denial of Service Protection Base.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997


  Loading...