Pekka Nikander

According to our database1, Pekka Nikander authored at least 67 papers between 1997 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Interledger Approaches.
IEEE Access, 2019

Interledger for the Industrial Internet of Things.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

The Case of iOS and Android: Applying System Dynamics to Digital Business Platforms.
Proceedings of the Computational Science - ICCS 2019, 2019

Interledger Demo: IoT Integration.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

Decentralized Beacons: Attesting the Ground Truth of Blockchain State for Constrained IoT Devices.
Proceedings of the 2019 Global IoT Summit, 2019

2018
Security and Privacy Challenges and Potential Solutions for DLT based IoT Systems.
Proceedings of the 2018 Global Internet of Things Summit, 2018

Aalto Observatory for Digital Valuation Systems.
Proceedings of the Digital Humanities in the Nordic Countries 3rd Conference, 2018

2017
Aalto Observatory on Digital Valuation Systems - A Position Paper.
Proceedings of the Internet Science, 2017

2014
Towards energy-efficient HealthCare: An Internet-of-Things architecture using intelligent gateways.
Proceedings of the 4th International Conference on Wireless Mobile Communication and Healthcare: "Transforming healthcare through innovations in mobile and wireless technologies", 2014

Web-Enabled Intelligent Gateways for eHealth Internet-of-Things.
Proceedings of the Internet of Things. User-Centric IoT, 2014

2013
ELL-i: An inexpensive platform for fixed things.
Scalable Computing: Practice and Experience, 2013

2012
Designing, implementing and evaluating a new internetworking architecture.
Comput. Commun., 2012

2011
HIP BONE: Host Identity Protocol (HIP) Based Overlay Networking Environment (BONE).
RFC, January, 2011

Forwarding anomalies in Bloom filter-based multicast.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks.
IEEE Communications Surveys and Tutorials, 2010

BloomCasting: Security in Bloom Filter Based Multicast.
Proceedings of the Information Security Technology for Applications, 2010

Developing Information Networking Further: From PSIRP to PURSUIT.
Proceedings of the Broadband Communications, Networks, and Systems, 2010

2009
LIPSIN: line speed publish/subscribe inter-networking.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Future Internet Socio-Economics - Challenges and Perspectives.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

2008
Using the Host Identity Protocol with Legacy Applications.
RFC, September, 2008

End-Host Mobility and Multihoming with the Host Identity Protocol.
RFC, April, 2008

Host Identity Protocol (HIP) Domain Name System (DNS) Extensions.
RFC, April, 2008

Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP).
RFC, April, 2008

Host Identity Protocol.
RFC, April, 2008

Hi3: An efficient and secure networking architecture for mobile hosts.
Comput. Commun., 2008

A Framework to Combine the Session Initiation Protocol and the Host Identity Protocol.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Towards Understanding Pure Publish/Subscribe Cryptographic Protocols.
Proceedings of the Security Protocols XVI, 2008

Towards Understanding Pure Publish/Subscribe Cryptographic Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Incentive-compatible caching and peering in data-oriented networks.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID).
RFC, April, 2007

The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security together.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Evolution of networking: Current problems and future directions.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2006
Host Identity Protocol (HIP) Architecture.
RFC, May, 2006

2005
Mobile IP Version 6 Route Optimization Security Design Background.
RFC, December, 2005

SEcure Neighbor Discovery (SEND).
RFC, March, 2005

Enhancing Privacy with Shared Pseudo Random Sequences.
Proceedings of the Security Protocols, 2005

Enhancing Privacy with Shared Pseudo Random Sequences.
Proceedings of the Security Protocols, 2005

2004
IPv6 Neighbor Discovery (ND) Trust Models and Threats.
RFC, May, 2004

Mobile IPv6 Security.
Wireless Personal Communications, 2004

BLIND: A Complete Identity Protection Framework for End-Points.
Proceedings of the Security Protocols, 2004

Effects of Mobility and Multihoming on Transport-Protocol Security.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Applying Host Identity Protocol to the Internet Addressing Architecture.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Re-thinking Security in IP Based Micro-Mobility.
Proceedings of the Information Security, 7th International Conference, 2004

2003
Limitations of IPsec Policy Mechanisms.
Proceedings of the Security Protocols, 2003

Integrating Security, Mobility and Multi-Homing in a HIP Way.
Proceedings of the Network and Distributed System Security Symposium, 2003

TAPI: Transactions for Accessing Public Infrastructure.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

2002
Securing IPv6 neighbor and router discovery.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

Authorization and Charging in Public WLANs Using FreeBSD and 802.1x.
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, 2002

Delegation of Signalling Rights.
Proceedings of the Security Protocols, 2002

Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.
Proceedings of the Security Protocols, 2002

Trustworthiness as an Asset.
Proceedings of the Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI), 30. September, 2002

2001
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.
Proceedings of the Security Protocols, 2001

Decentralized Jini Security.
Proceedings of the Network and Distributed System Security Symposium, 2001

2000
An Operating System in Java for the Lego Mindstorms RCX Microcontroller.
Proceedings of the Freenix Track: 2000 USENIX Annual Technical Conference, 2000

Users and Trust in Cyberspace.
Proceedings of the Security Protocols, 2000

Users and Trust in Cyberspace (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

DOS-Resistant Authentication with Client Puzzles.
Proceedings of the Security Protocols, 2000

Policy and Trust in Open Multi-Operator Networks.
Proceedings of the Telecommunication Network Intelligence, 2000

Towards Network Denial of Service Resistant Protocols.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Securing ad hoc services, a Jini view: extended abstract.
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000

Decentralized Authorization with ECDSA on a Java Smart Card.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Preserving Privacy in Distributed Delegation with Fast Certificates.
Proceedings of the Public Key Cryptography, 1999

Distributed Policy Management for JDK 1.2.
Proceedings of the Network and Distributed System Security Symposium, 1999

1998
A Java Beans Component Architecture for Cryptographic Protocols.
Proceedings of the 7th USENIX Security Symposium, 1998

Certifying Trust.
Proceedings of the Public Key Cryptography, 1998

1997
Stateless connections.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...