Miika Komu

Orcid: 0000-0002-9687-5076

According to our database1, Miika Komu authored at least 35 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
QoS-Aware Congestion Control using SRv6.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023

2022
Benchmarking of Emulated Wireless Edge Cloud Connectivity for Maritime Environments.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

2021
Host Identity Protocol Architecture.
RFC, July, 2021

Native NAT Traversal Mode for the Host Identity Protocol.
RFC, July, 2021

Multi-Cloud Connectivity for Kubernetes in 5G Networks.
IEEE Commun. Mag., 2021

2020
Benchmarking Q-Learning Methods for Intelligent Network Orchestration in the Edge.
Proceedings of the 2nd 6G Wireless Summit, 2020

2019
Regression Training using Model Parallelism in a Distributed Cloud.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
Energy Efficiency in Wireless Multimedia Sensor Networking: Architecture, Management and Security.
Proceedings of the Greening Video Distribution Networks, 2018

Secure Cloud Connectivity for Scientific Applications.
IEEE Trans. Serv. Comput., 2018

Energy Consumption Analysis of Edge Orchestrated Virtualized Wireless Multimedia Sensor Networks.
IEEE Access, 2018

2017
SynAPTIC: Secure And Persistent connecTIvity for Containers.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Adoption of Constrained Application Protocol: A Techno-Economic Perspective.
Int. J. Innov. Digit. Econ., 2016

Device group management in constrained networks.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

An SDN-based approach to enhance the end-to-end security: SSL/TLS case study.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Power consumption in remote gaming: An empirical evaluation.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
A survey of identifier-locator split addressing architectures.
Comput. Sci. Rev., 2015

Capillary networks - bridging the cellular and IoT worlds.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Hypervisors vs. Lightweight Virtualization: A Performance Comparison.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

2014
Techno-economic feasibility analysis of constrained application protocol.
Proceedings of the IEEE World Forum on Internet of Things, 2014

H-box: Interconnecting devices across local networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

2013
Adoption barriers of network layer protocols: The case of host identity protocol.
Comput. Networks, 2013

2012
Secure Networking for Virtual Machines in the Cloud.
Proceedings of the 2012 IEEE International Conference on Cluster Computing Workshops, 2012

Anatomy of the connecting architecture of Internet of Things.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Basic Socket Interface Extensions for the Host Identity Protocol (HIP).
RFC, July, 2011

Sockets Application Program Interface (API) for Multihoming Shim.
RFC, July, 2011

Applicability analysis of grid security mechanisms on cloud networking.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators.
RFC, April, 2010

Enterprise Network Packet Filtering for Mobile Cryptographic Identities.
Int. J. Handheld Comput. Res., 2010

Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles.
Proceedings of the Information Security Technology for Applications, 2010

2009
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace.
Proceedings of IEEE International Conference on Communications, 2009

Leap-of-Faith Security is Enough for IP Mobility.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Usable security management with host identity protocol.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Using the Host Identity Protocol with Legacy Applications.
RFC, September, 2008

2007
Cure for Spam Over Internet Telephony.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2005
Applying a cryptographic namespace to applications.
Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, 2005


  Loading...