Kimmo Halunen

Orcid: 0000-0003-1169-5920

According to our database1, Kimmo Halunen authored at least 36 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automating IoT Security Standard Testing by Common Security Tools.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Implementing Post-quantum Cryptography for Developers.
SN Comput. Sci., July, 2023

Transparent Security Method for Automating IoT Security Assessments.
Proceedings of the Information Security Practice and Experience, 2023

Vulnerabilities in IoT Devices, Backends, Applications, and Components.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines.
Proceedings of the 7th International Conference on Internet of Things, 2022

Implementing Post-quantum Cryptography for Developers.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Models-Based Analysis of Both User and Attacker Tasks: Application to EEVEHAC.
Proceedings of the Human-Centered Software Engineering, 2022

Applying a cryptographic metric to post-quantum lattice-based signature algorithms.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Review of the use of human senses and capabilities in cryptography.
Comput. Sci. Rev., 2021

Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

CryptoVault - A Secure Hardware Wallet for Decentralized Key Management.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021

2020
A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms.
Proceedings of the Human-Centered Software Engineering, 2020

2018
Cryptography for Human Senses.
IACR Cryptol. ePrint Arch., 2018

Smart Contracts for a Mobility-as-a-Service Ecosystem.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

On the Similarities between Blockchains and Merkle-Damgård Hash Functions.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

"Speak, Friend, and Enter" - Secure, Spoken One-Time Password Authentication.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
Evaluation of user authentication methods in the gadget-free world.
Pervasive Mob. Comput., 2017

Evaluating the Efficiency of Blockchains in IoT with Simulations.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Measuring the value of privacy and the efficacy of PETs.
Proceedings of the 11th European Conference on Software Architecture, 2017

n-Auth: Mobile Authentication Done Right.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Secure, Usable and Privacy-Friendly User Authentication from Keystroke Dynamics.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Recipient Privacy in Online Social Networks.
Proceedings of the Advances in Information and Computer Security, 2016

Improving the Sphinx Mix Network.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2014
Identity-Based Cryptography in Credit Card Payments.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Detecting man-in-the-middle attacks on non-mobile systems.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2012
Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions.
PhD thesis, 2012

2011
Multicollisions and Graph-Based Hash Functions.
Proceedings of the Trusted Systems - Third International Conference, 2011

Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011

2010
Multicollision attacks and generalized iterated hash functions.
J. Math. Cryptol., 2010

Preimage Attacks against Variants of Very Smooth Hash.
Proceedings of the Advances in Information and Computer Security, 2010

Variants of Multicollision Attacks on Iterated Hash Functions.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

2009
Finding Preimages of Multiple Passwords Secured with VSH.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Experiences with Model Inference Assisted Fuzzing.
Proceedings of the 2nd USENIX Workshop on Offensive Technologies, 2008

Vulnerability Dependencies in Antivirus Software.
Proceedings of the Second International Conference on Emerging Security Information, 2008

On the Security of VSH in Password Schemes.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...