Valtteri Niemi

According to our database1, Valtteri Niemi authored at least 88 papers between 1984 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
On Post-Quantum Identification in 5G.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Privacy-friendly Discovery of Common Friends in P2P Networks.
Proceedings of the 31st Conference of Open Innovations Association, 2022

2021
FPGA Implementations of 256-Bit SNOW Stream Ciphers for Postquantum Mobile Security.
IEEE Trans. Very Large Scale Integr. Syst., 2021

Privacy-Aware Contact Sharing for Groups in P2P Networks.
Int. J. Embed. Real Time Commun. Syst., 2021

AKMA: Delegated Authentication System of 5G.
IEEE Commun. Stand. Mag., 2021

Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

Parental Control with Edge Computing and 5G Networks.
Proceedings of the 29th Conference of Open Innovations Association, 2021

Multi-party Private Set Operations with an External Decider.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
AI-Based Cyberbullying Prevention in 5G Networks.
Int. J. Embed. Real Time Commun. Syst., 2020

Privacy-Preserving Peer Discovery for Group Management in p2p Networks.
Proceedings of the 27th Conference of Open Innovations Association, 2020

2019
Privacy-Protecting Algorithms for Digraph Shortest Path Queries.
Int. J. Embed. Real Time Commun. Syst., 2019

Privacy Preserving AKMA in 5G.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

Privacy preserving 2-party queries on bipartite graphs with private set intersection.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Privacy Preserving Cyberbullying Prevention with AI Methods in 5G Networks.
Proceedings of the 25th Conference of Open Innovations Association, 2019

AKMA Support in Multi SIM User Equipment.
Proceedings of the 25th Conference of Open Innovations Association, 2019

2018
IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN).
IEEE Access, 2018

Estimating Message Transmission Time Over Heterogeneous Disrupted Links.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

Defeating the Downgrade Attack on Identity Privacy in 5G.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

Privacy Preserving Queries on Directed Graph.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Privacy Preserving Shortest Path Queries on Directed Graph.
Proceedings of the 22nd Conference of Open Innovations Association, 2018

2017
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications.
Mob. Networks Appl., 2017

Auditable De-anonymization in V2X Communication.
J. ICT Stand., 2017

Privacy Enhanced Fast Mutual Authentication in 5G Network Using Identity Based Encryption.
J. ICT Stand., 2017

Evaluating the performance and privacy of a token-based collaborative recommender.
Proceedings of the International Conference on Web Intelligence, 2017

Private Membership Test Protocol with Low Communication Complexity.
Proceedings of the Network and System Security - 11th International Conference, 2017

Mind Your Right to Know: On De-anonymization Auditability in V2X Communications.
Proceedings of the Network and System Security - 11th International Conference, 2017

Concealing IMSI in 5G Network Using Identity Based Encryption.
Proceedings of the Network and System Security - 11th International Conference, 2017

On De-synchronization of User Pseudonyms in Mobile Networks.
Proceedings of the Information Systems Security - 13th International Conference, 2017

AES and SNOW 3G are Feasible Choices for a 5G Phone from Energy Perspective.
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017

2016
Key technologies for 5G, the next generation of mobile networks and services.
Int. J. Commun. Syst., 2016

Two Schemes of Privacy-Preserving Trust Evaluation.
Future Gener. Comput. Syst., 2016

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Privacy of the long-term identities in cellular networks.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

2015
How to Use Garbling for Privacy Preserving Electronic Surveillance Services.
J. Cyber Secur. Mobil., 2015

Extended Model of Side-Information in Garbling.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Private Membership Test for Bloom Filters.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Demo: Cloud-based Security as a Service for Smart IoT Environments.
Proceedings of the 2015 Workshop on Wireless of the Students, 2015

2014
Editorial: Special issue on trust in cyber, physical and social computing.
Comput. Secur., 2014

Message fragmentation for a chain of disrupted links.
Comput. Commun., 2014

Garbling in Reverse Order.
Proceedings of the 13th IEEE International Conference on Trust, 2014

On Reusable Projective Garbling Schemes.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Exploring the impact of trust information visualization on mobile application usage.
Pers. Ubiquitous Comput., 2013

Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks.
Mob. Networks Appl., 2013

Fragmentation algorithms for DTN links.
Comput. Commun., 2013

Inferring social ties in academic networks using short-range wireless communications.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

A Research Model for Trustworthy Pervasive Social Networking.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Inferring social ties in pervasive networks: an on-campus comparative study.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Secure pervasive social networking based on multi-dimensional trust levels.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Distributed and minimal usage control.
Serv. Oriented Comput. Appl., 2012

Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks.
Proceedings of the Pervasive Computing - 10th International Conference, 2012

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Distributed Usage Control.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Meetings through the cloud: Privacy-preserving scheduling on mobile devices.
J. Syst. Softw., 2011

Privacy-triggered communications in pervasive social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Privacy, Identity and Trust in Context-Aware Mobile Services.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Implementation of a Reputation System for Pervasive Social Networking.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Transforming Privacy Policies to Auditing Specifications.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Message Fragmentation for Disrupted Links.
Proceedings of the European Wireless 2011, April 27-29, 2011, Vienna, Austria., 2011

Privacy-preserving activity scheduling on mobile devices.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Reachability in Restricted Walk on Integers.
J. Univers. Comput. Sci., 2010

Editorial for the LTE special section.
Comput. Commun., 2010

Effects of Displaying Trust Information on Mobile Application Usage.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Exploring Trust of Mobile Applications Based on User Behaviors.
Proceedings of the Trusted Systems, First International Conference, 2009

A Methodology towards Usable Trust Management.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
A User Behavior Based Trust Model for Mobile Applications.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2004
Trends in mobile security standards.
Inf. Secur. Tech. Rep., 2004

Issues with Applying Cryptography in Wireless Systems.
Proceedings of the Theory Is Forever, 2004

2003
Cryptography in Wireless Standards: (Invited Paper).
Proceedings of the Cryptography and Coding, 2003

Hiding Regular Languages.
Proceedings of the Grammars and Automata for String Processing: From Mathematics and Computer Science to Biology, 2003

UMTS security.
Wiley, ISBN: 978-0-470-84794-7, 2003

2002
Man-in-the-Middle in Tunnelled Authentication Protocols.
IACR Cryptol. ePrint Arch., 2002

2001
Secure Vickrey Auctions without Threshold Trust.
IACR Cryptol. ePrint Arch., 2001

1999
Efficient Voting with No Selling of Votes.
Theor. Comput. Sci., 1999

Solitaire Zero-knowledge.
Fundam. Informaticae, 1999

1998
Secure Multiparty Computations Without Computers.
Theor. Comput. Sci., 1998

1997
Cryptology: Language-Theoretic Aspects.
Proceedings of the Handbook of Formal Languages, 1997

TWOPRIME: A Fast Stream Ciphering Algorithm.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Multiparty Computations with a Deck of Cards.
Proceedings of the 3rd International Conference Developments in Language Theory, 1997

1995
Colored Gauss and Tangent Codes on the Torus.
Proceedings of the Developments in Language Theory II, 1995

1994
Cryptographic Protocols and Voting.
Proceedings of the Results and Trends in Theoretical Computer Science, 1994

How to Prevent Buying of Votes in Computer Elections.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Density in discrete systems.
Proceedings of the Current Trends in Theoretical Computer Science - Essays and Tutorials, 1993

Morphic Images of Gauss Codes.
Proceedings of the Developments in Language Theory, 1993

1991
Density in discrete systems.
Bull. EATCS, 1991

Power languages and density.
Discret. Appl. Math., 1991

1990
A New Trapdoor in Knapsacks.
Proceedings of the Advances in Cryptology, 1990

1988
Maximal Dense Intervals of Grammar Forms.
Proceedings of the Automata, Languages and Programming, 15th International Colloquium, 1988

1984
The Undecidability of Form Equivalence for Context-Free and E0L Forms.
Theor. Comput. Sci., 1984


  Loading...