Teemupekka Virtanen

According to our database1, Teemupekka Virtanen authored at least 23 papers between 2001 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A Consent-patienship Based Privacy Model for Healthcare.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2009
The Finnish National eHealth Archive and the New Research Possibilities.
Proceedings of the Connecting Health and Humans - Proceedings of NI2009, The 10th International Congress on Nursing Informatics, 28 June, 2009

2005
Understanding and Communicating It Security Specifications with Uml.
Int. J. Softw. Eng. Knowl. Eng., 2005

BT-Crowds: Crowds-Style Anonymity with Bluetooth and Java.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Technical Comparison of Domain Keys and Sender ID.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Early Warning for Network Worms.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Security in Globally Distributed Industrial Information Systems.
Proceedings of the Security and Protection in Information Processing Systems, 2004

IPsec Clustering.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Security Services by ISPs, Real Value or Waste of Money?
Proceedings of the Pacific Asia Conference on Information Systems, 2004

A Service Discovery: A Service Broker Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

MIDP 2.0 Security Enhancements.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Centralized Management of Virtual Security Zones in IP Networks.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Priorities in the Development of Network Intrusion Detection Systems.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Changes in the Profile of Security Managers.
Proceedings of the Security Education and Critical Infrastructures, 2003

Automatic Backdoor Analysis with Network Intrusion Detection System and Integrated Service Checker.
Proceedings of the IEEE Systems, 2003

2002
An Information Security Curriculum in Finland.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

A System For Secure Mobile Payment Transactions.
Proceedings of the Information Systems: The e-Business Challenge, 2002

A computerised examination system.
Proceedings of the TelE-Learning: the Challenge for the Third Millennium, IFIP 17<sup>th</sup> World Computer Congress, 2002

Distributed learning and management system for university courses.
Proceedings of the TelE-Learning: the Challenge for the Third Millennium, IFIP 17<sup>th</sup> World Computer Congress, 2002

Attacking Predictable IPsec ESP Initialization Vectors.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
Design Criteria to Classified Information Systems Numerically.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

The Security Model to Combine the Corporate and Information Security.
Proceedings of the Trusted Information: The New Decade Challenge, 2001


  Loading...