Tommi Meskanen

Orcid: 0000-0002-7708-4308

According to our database1, Tommi Meskanen authored at least 23 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On Post-Quantum Perfect Forward Secrecy in 6G.
CoRR, 2022

A Beyond-5G Authentication and Key Agreement Protocol.
Proceedings of the Network and System Security - 16th International Conference, 2022

Privacy-friendly Discovery of Common Friends in P2P Networks.
Proceedings of the 31st Conference of Open Innovations Association, 2022

2021
Privacy-Aware Contact Sharing for Groups in P2P Networks.
Int. J. Embed. Real Time Commun. Syst., 2021

Parental Control with Edge Computing and 5G Networks.
Proceedings of the 29th Conference of Open Innovations Association, 2021

Multi-party Private Set Operations with an External Decider.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
AI-Based Cyberbullying Prevention in 5G Networks.
Int. J. Embed. Real Time Commun. Syst., 2020

Private membership test protocol with low communication complexity.
Digit. Commun. Networks, 2020

Privacy-Preserving Peer Discovery for Group Management in p2p Networks.
Proceedings of the 27th Conference of Open Innovations Association, 2020

2019
Privacy-Protecting Algorithms for Digraph Shortest Path Queries.
Int. J. Embed. Real Time Commun. Syst., 2019

Privacy preserving 2-party queries on bipartite graphs with private set intersection.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
Privacy Preserving Queries on Directed Graph.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Privacy Preserving Shortest Path Queries on Directed Graph.
Proceedings of the 22nd Conference of Open Innovations Association, 2018

2017
Auditable De-anonymization in V2X Communication.
J. ICT Stand., 2017

Private Membership Test Protocol with Low Communication Complexity.
Proceedings of the Network and System Security - 11th International Conference, 2017

Mind Your Right to Know: On De-anonymization Auditability in V2X Communications.
Proceedings of the Network and System Security - 11th International Conference, 2017

2015
How to Use Garbling for Privacy Preserving Electronic Surveillance Services.
J. Cyber Secur. Mobil., 2015

Extended Model of Side-Information in Garbling.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Private Membership Test for Bloom Filters.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Garbling in Reverse Order.
Proceedings of the 13th IEEE International Conference on Trust, 2014

On Reusable Projective Garbling Schemes.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2006
A wrap error attack against NTRUEncrypt.
Discret. Appl. Math., 2006

2004
On Distributed Computing on Elliptic Curves.
Proceedings of the Theory Is Forever, 2004


  Loading...