default search action
N. Asokan
Person information
- affiliation: University of Waterloo, ON, Canada
- affiliation: Aalto University, Department of Computer Science and Engineering
- affiliation (former): University of Helsinki, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c145]Ruizhe Wang, Meng Xu, N. Asokan:
S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More. DIMVA 2024: 23-43 - [c144]Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan:
Attesting Distributional Properties of Training Data for Machine Learning. ESORICS (1) 2024: 3-23 - [c143]Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan:
Data-Oblivious ML Accelerators Using Hardware Security Extensions. HOST 2024: 373-377 - [c142]Owura Asare, Meiyappan Nagappan, N. Asokan:
A User-centered Security Evaluation of Copilot. ICSE 2024: 158:1-158:11 - [c141]Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking. NDSS 2024 - [c140]Asim Waheed, Vasisht Duddu, N. Asokan:
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings. SP 2024: 2460-2477 - [c139]Vasisht Duddu, Sebastian Szyller, N. Asokan:
SoK: Unintended Interactions among Machine Learning Defenses and Risks. SP 2024: 2996-3014 - [c138]Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan:
False Claims against Model Ownership Resolution. USENIX Security Symposium 2024 - [i87]Michael Wrana, Diogo Barradas, N. Asokan:
The Spectre of Surveillance and Censorship in Future Internet Architectures. CoRR abs/2401.15828 (2024) - [i86]Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan:
Data-Oblivious ML Accelerators using Hardware Security Extensions. CoRR abs/2401.16583 (2024) - [i85]Ruizhe Wang, Meng Xu, N. Asokan:
S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More. CoRR abs/2402.01894 (2024) - [i84]Ruizhe Wang, Meng Xu, N. Asokan:
SeMalloc: Semantics-Informed Memory Allocator. CoRR abs/2402.03373 (2024) - [i83]Anudeep Das, Vasisht Duddu, Rui Zhang, N. Asokan:
Espresso: Robust Concept Filtering in Text-to-Image Models. CoRR abs/2404.19227 (2024) - [i82]Hossam ElAtali, N. Asokan:
Cancellable Memory Requests: A transparent, lightweight Spectre mitigation. CoRR abs/2406.12110 (2024) - [i81]Hossam ElAtali, Xiaohe Duan, Hans Liljestrand, Meng Xu, N. Asokan:
BliMe Linter. CoRR abs/2406.15302 (2024) - [i80]Vasisht Duddu, Oskari Järvinen, Lachlan J. Gunn, N. Asokan:
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations. CoRR abs/2406.17548 (2024) - 2023
- [j34]Owura Asare, Meiyappan Nagappan, N. Asokan:
Is GitHub's Copilot as bad as humans at introducing vulnerabilities in code? Empir. Softw. Eng. 28(6): 129 (2023) - [j33]Sebastian Szyller, Rui Zhang, Jian Liu, N. Asokan:
On the Robustness of Dataset Inference. Trans. Mach. Learn. Res. 2023 (2023) - [c137]Sebastian Szyller, N. Asokan:
Conflicting Interactions among Protection Mechanisms for Machine Learning Models. AAAI 2023: 15179-15187 - [c136]Buse G. A. Tekgul, N. Asokan:
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks. ACSAC 2023: 492-505 - [c135]N. Asokan:
Model Stealing Attacks and Defenses: Where Are We Now? AsiaCCS 2023: 327 - [c134]Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao:
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks. USENIX Security Symposium 2023: 1433-1450 - [c133]Parjanya Vyas, Asim Waheed, Yousra Aafer, N. Asokan:
Auditing Framework APIs via Inferred App-side Security Specifications. USENIX Security Symposium 2023: 6061-6077 - [i79]Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan:
False Claims against Model Ownership Resolution. CoRR abs/2304.06607 (2023) - [i78]Asim Waheed, Vasisht Duddu, N. Asokan:
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings. CoRR abs/2304.08566 (2023) - [i77]Jian Liu, Peilun Li, Raymond Cheng, N. Asokan, Dawn Song:
Parallel and Asynchronous Smart Contract Execution. CoRR abs/2306.05007 (2023) - [i76]Buse G. A. Tekgul, N. Asokan:
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks. CoRR abs/2307.14751 (2023) - [i75]Owura Asare, Meiyappan Nagappan, N. Asokan:
Copilot Security: A User Study. CoRR abs/2308.06587 (2023) - [i74]Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan:
Attesting Distributional Properties of Training Data for Machine Learning. CoRR abs/2308.09552 (2023) - [i73]Vasisht Duddu, Sebastian Szyller, N. Asokan:
SoK: Unintended Interactions among Machine Learning Defenses and Risks. CoRR abs/2312.04542 (2023) - 2022
- [j32]Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, Thomas Nyman:
Hardware Platform Security for Mobile Devices. Found. Trends Priv. Secur. 3(3-4): 214-394 (2022) - [j31]Jian Liu, Peilun Li, Raymond Cheng, N. Asokan, Dawn Song:
Parallel and Asynchronous Smart Contract Execution. IEEE Trans. Parallel Distributed Syst. 33(5): 1097-1108 (2022) - [c132]Buse Gul Atli Tekgul, N. Asokan:
On the Effectiveness of Dataset Watermarking. IWSPA@CODASPY 2022: 93-99 - [c131]Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan:
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses. ESORICS (3) 2022: 384-404 - [c130]Setareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
Towards cryptographically-authenticated in-memory data structures. SecDev 2022: 30-44 - [i72]Buse Gul Atli Tekgul, N. Asokan:
On the Effectiveness of Dataset Watermarking in Adversarial Settings. CoRR abs/2202.12506 (2022) - [i71]Hans Liljestrand, Carlos Chinea Perez, Rémi Denis-Courmont, Jan-Erik Ekberg, N. Asokan:
Color My World: Deterministic Tagging for Memory Safety. CoRR abs/2204.03781 (2022) - [i70]Owura Asare, Meiyappan Nagappan, N. Asokan:
Is GitHub's Copilot as Bad As Humans at Introducing Vulnerabilities in Code? CoRR abs/2204.04741 (2022) - [i69]Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking. CoRR abs/2204.09649 (2022) - [i68]Sebastian Szyller, N. Asokan:
Conflicting Interactions Among Protections Mechanisms for Machine Learning Models. CoRR abs/2207.01991 (2022) - [i67]Setareh Ghorshi, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
Towards cryptographically-authenticated in-memory data structures. CoRR abs/2210.11340 (2022) - [i66]Sebastian Szyller, Rui Zhang, Jian Liu, N. Asokan:
On the Robustness of Dataset Inference. CoRR abs/2210.13631 (2022) - 2021
- [j30]Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Trans. Priv. Secur. 24(4): 26:1-26:36 (2021) - [c129]Logan Blue, Samuel Marchal, Patrick Traynor, N. Asokan:
Lux: Enabling Ephemeral Authorization for Display-Limited IoT Devices. IoTDI 2021: 15-27 - [c128]Ron Deibert, N. Asokan, Thenusha Satsoruban:
Investigating targeted espionage: Methods, findings, implications. ISTAS 2021: 1 - [c127]Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan:
DAWN: Dynamic Adversarial Watermarking of Neural Networks. ACM Multimedia 2021: 4417-4425 - [c126]Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:
Tutorial: Investigating Advanced Exploits for System Security Assurance. SecDev 2021: 3-4 - [c125]Buse G. A. Tekgul, Yuxi Xia, Samuel Marchal, N. Asokan:
WAFFLE: Watermarking in Federated Learning. SRDS 2021: 310-320 - [c124]Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan:
PACStack: an Authenticated Call Stack. USENIX Security Symposium 2021: 357-374 - [i65]Sebastian Szyller, Vasisht Duddu, Tommi Gröndahl, N. Asokan:
Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks. CoRR abs/2104.12623 (2021) - [i64]Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan:
Real-time Attacks Against Deep Reinforcement Learning Policies. CoRR abs/2106.08746 (2021) - [i63]Vasisht Duddu, Sebastian Szyller, N. Asokan:
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning. CoRR abs/2112.02230 (2021) - 2020
- [j29]Mohammad Mannan, N. Asokan:
Confronting the Limitations of Hardware-Assisted Security. IEEE Secur. Priv. 18(5): 6-7 (2020) - [j28]Tommi Gröndahl, N. Asokan:
Effective writing style transfer via combinatorial paraphrasing. Proc. Priv. Enhancing Technol. 2020(4): 175-195 (2020) - [c123]Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan:
A little goes a long way: Improving toxic language classification despite data scarcity. EMNLP (Findings) 2020: 2991-3009 - [i62]Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan:
WAFFLE: Watermarking in Federated Learning. CoRR abs/2008.07298 (2020) - [i61]Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan:
A little goes a long way: Improving toxic language classification despite data scarcity. CoRR abs/2009.12344 (2020)
2010 – 2019
- 2019
- [j27]Tommi Gröndahl, N. Asokan:
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? ACM Comput. Surv. 52(3): 45:1-45:36 (2019) - [j26]Samuel Marchal, Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication. IEEE J. Sel. Areas Commun. 37(6): 1402-1412 (2019) - [j25]Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider:
SoK: Modular and Efficient Private Decision Tree Evaluation. Proc. Priv. Enhancing Technol. 2019(2): 187-208 (2019) - [j24]Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan:
Circumventing Cryptographic Deniability with Remote Attestation. Proc. Priv. Enhancing Technol. 2019(3): 350-369 (2019) - [j23]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing. IEEE Trans. Computers 68(1): 139-151 (2019) - [j22]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Sensor-Based Proximity Detection in the Face of Active Adversaries. IEEE Trans. Mob. Comput. 18(2): 444-457 (2019) - [c122]Mika Juuti, Buse Gul Atli, N. Asokan:
Making Targeted Black-box Evasion Attacks Effective and Efficient. AISec@CCS 2019: 83-94 - [c121]Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CCSW 2019: 185-199 - [c120]N. Asokan:
Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead. CCS 2019: 1687 - [c119]Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks. DAC 2019: 63 - [c118]Hans Liljestrand, Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Authenticated Call Stack. DAC 2019: 223 - [c117]Andrew Paverd, Marcus Völp, Ferdinand Brasser, Matthias Schunter, N. Asokan, Ahmad-Reza Sadeghi, Paulo Jorge Esteves Veríssimo, Andreas Steininger, Thorsten Holz:
Sustainable Security & Safety: Challenges and Opportunities. CERTS 2019: 4:1-4:13 - [c116]Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan:
PRADA: Protecting Against DNN Model Stealing Attacks. EuroS&P 2019: 512-527 - [c115]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Federated Self-learning Anomaly Detection System for IoT. ICDCS 2019: 756-767 - [c114]Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Claudio Soriente, Sasu Tarkoma, N. Asokan:
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification. PerCom 2019: 1-9 - [c113]Long Cheng, Hans Liljestrand, Md. Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng Yao:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - [c112]Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Protecting the stack with PACed canaries. SysTEX@SOSP 2019: 4:1-4:6 - [c111]Lachlan J. Gunn, Jian Liu, Bruno Vavala, N. Asokan:
Making Speculative BFT Resilient with Trusted Monotonic Counters. SRDS 2019: 133-142 - [c110]Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. USENIX Security Symposium 2019: 177-194 - [i60]Long Cheng, Hans Liljestrand, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan:
Exploitation Techniques and Defenses for Data-Oriented Attacks. CoRR abs/1902.08359 (2019) - [i59]Tommi Gröndahl, N. Asokan:
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? CoRR abs/1902.08939 (2019) - [i58]Tommi Gröndahl, N. Asokan:
Using logical form encodings for unsupervised linguistic transformation: Theory and applications. CoRR abs/1902.09381 (2019) - [i57]Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan:
PACStack: an Authenticated Call Stack. CoRR abs/1905.10242 (2019) - [i56]Lachlan J. Gunn, Jian Liu, Bruno Vavala, N. Asokan:
Making Speculative BFT Resilient with Trusted Monotonic Counters. CoRR abs/1905.10255 (2019) - [i55]Tommi Gröndahl, N. Asokan:
Effective writing style imitation via combinatorial paraphrasing. CoRR abs/1905.13464 (2019) - [i54]Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan:
DAWN: Dynamic Adversarial Watermarking of Neural Networks. CoRR abs/1906.00830 (2019) - [i53]Mika Juuti, Buse Gul Atli, N. Asokan:
Making targeted black-box evasion attacks effective and efficient. CoRR abs/1906.03397 (2019) - [i52]Hans Liljestrand, Zaheer Gauhar, Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Protecting the stack with PACed canaries. CoRR abs/1909.05747 (2019) - [i51]Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan:
Extraction of Complex DNN Models: Real Threat or Boogeyman? CoRR abs/1910.05429 (2019) - 2018
- [j21]Markus Miettinen, N. Asokan:
Ad-hoc key agreement: A brief history and the challenges ahead. Comput. Commun. 131: 32-34 (2018) - [j20]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Toward Fairness of Cryptocurrency Payments. IEEE Secur. Priv. 16(3): 81-89 (2018) - [j19]Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Grondahl, N. Asokan, Ahmad-Reza Sadeghi:
OmniShare: Encrypted Cloud Storage for the Multi-Device Era. IEEE Internet Comput. 22(4): 27-36 (2018) - [j18]Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan:
Toward Linux kernel memory safety. Softw. Pract. Exp. 48(12): 2237-2256 (2018) - [j17]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(11): 2290-2300 (2018) - [c109]Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. ARES 2018: 40:1-40:10 - [c108]Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan:
All You Need is: Evading Hate Speech Detection. AISec@CCS 2018: 2-12 - [c107]Jian Liu, Li Duan, Yong Li, N. Asokan:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. CT-RSA 2018: 374-393 - [c106]Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
Revisiting context-based authentication in IoT. DAC 2018: 32:1-32:6 - [c105]Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan:
Migrating SGX Enclaves with Persistent State. DSN 2018: 195-206 - [c104]Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan:
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews. ESORICS (1) 2018: 132-151 - [c103]Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic:
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories. EuroS&P 2018: 199-213 - [c102]Md Sakib Nizam Khan, Samuel Marchal, Sonja Buchegger, N. Asokan:
chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change. Privacy and Identity Management 2018: 205-221 - [c101]Samuel Marchal, N. Asokan:
On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World. CSET @ USENIX Security Symposium 2018 - [c100]Arseny Kurnikov, Klaudia Krawiecka, Andrew Paverd, Mohammad Mannan, N. Asokan:
Using SafeKeeper to Protect Web Passwords. WWW (Companion Volume) 2018: 159-162 - [c99]Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
SafeKeeper: Protecting Web Passwords using Trusted Execution Environments. WWW 2018: 349-358 - [i50]Hien Thi Thu Truong, Juhani Toivonen, Thien Duc Nguyen, Sasu Tarkoma, N. Asokan:
Proximity Verification Based on Acoustic Room Impulse Response. CoRR abs/1803.07211 (2018) - [i49]Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan:
Migrating SGX Enclaves with Persistent State. CoRR abs/1803.11021 (2018) - [i48]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Minh Hoang Dang, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. CoRR abs/1804.07474 (2018) - [i47]Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. CoRR abs/1804.08569 (2018) - [i46]Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan:
Stay On-Topic: Generating Context-specific Fake Restaurant Reviews. CoRR abs/1805.02400 (2018) - [i45]Mika Juuti, Sebastian Szyller, Alexey Dmitrenko, Samuel Marchal, N. Asokan:
PRADA: Protecting against DNN Model Stealing Attacks. CoRR abs/1805.02628 (2018) - [i44]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. CoRR abs/1807.05002 (2018) - [i43]Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan:
All You Need is "Love": Evading Hate-speech Detection. CoRR abs/1808.09115 (2018) - [i42]Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CoRR abs/1810.06080 (2018) - [i41]Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, N. Asokan:
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. CoRR abs/1811.09189 (2018) - [i40]Lachlan J. Gunn, Ricardo Vieitez Parra, N. Asokan:
On The Use of Remote Attestation to Break and Repair Deniability. IACR Cryptol. ePrint Arch. 2018: 424 (2018) - [i39]Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider:
SoK: Modular and Efficient Private Decision Tree Evaluation. IACR Cryptol. ePrint Arch. 2018: 1099 (2018) - 2017
- [j16]Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. Proc. Priv. Enhancing Technol. 2017(4): 177-197 (2017) - [j15]Samuel Marchal, Giovanni Armano, Tommi Grondahl, Kalle Saari, Nidhi Singh, N. Asokan:
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application. IEEE Trans. Computers 66(10): 1717-1733 (2017) - [c98]Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan:
The Circle Game: Scalable Private Membership Test Using Trusted Hardware. AsiaCCS 2017: 31-44 - [c97]Jian Liu, Mika Juuti, Yao Lu, N. Asokan:
Oblivious Neural Network Predictions via MiniONN Transformations. CCS 2017: 619-631 - [c96]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. DAC 2017: 24:1-24:6 - [c95]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2177-2184 - [c94]Radek Tomsu, Samuel Marchal, N. Asokan:
Profiling Users by Modeling Web Transactions. ICDCS 2017: 2399-2404 - [c93]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2511-2514 - [c92]Elena Reshetova, Filippo Bonazzi, N. Asokan:
SELint: An SEAndroid Policy Analysis Tool. ICISSP 2017: 47-58 - [c91]Elena Reshetova, Filippo Bonazzi, N. Asokan:
Randomization Can't Stop BPF JIT Spray. NSS 2017: 233-247 - [c90]Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan:
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers. RAID 2017: 259-284 - [c89]Mika Juuti, Christian Vaas, Hans Liljestrand, Ivo Sluganovic, N. Asokan, Ivan Martinovic:
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication. SECON 2017: 1-2 - [c88]Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan, Ivan Martinovic:
STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification. SECON 2017: 1-9 - [i38]Radek Tomsu, Samuel Marchal, N. Asokan:
Profiling Users by Modeling Web Transactions. CoRR abs/1703.09745 (2017) - [i37]Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement. CoRR abs/1705.10295 (2017) - [i36]Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, Ahmad-Reza Sadeghi:
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. CoRR abs/1706.03754 (2017) - [i35]Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan:
CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers. CoRR abs/1706.05715 (2017) - [i34]Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Protecting Web Passwords from Rogue Servers using Trusted Execution Environments. CoRR abs/1709.01261 (2017) - [i33]Elena Reshetova, Hans Liljestrand, Andrew Paverd, N. Asokan:
Towards Linux Kernel Memory Safety. CoRR abs/1710.06175 (2017) - [i32]Jian Liu, Mika Juuti, Yao Lu, N. Asokan:
Oblivious Neural Network Predictions via MiniONN transformations. IACR Cryptol. ePrint Arch. 2017: 452 (2017) - [i31]Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas:
Private Set Intersection for Unequal Set Sizes with Mobile Applications. IACR Cryptol. ePrint Arch. 2017: 670 (2017) - [i30]Jian Liu, Li Duan, Yong Li, N. Asokan:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. IACR Cryptol. ePrint Arch. 2017: 1089 (2017) - 2016
- [j14]Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan:
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs. Comput. Commun. 85: 1-13 (2016) - [c87]Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-Flow Attestation for Embedded Systems Software. CCS 2016: 743-754 - [c86]Tigist Abera, N. Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
Invited - Things, trouble, trust: on building trust in IoT systems. DAC 2016: 121:1-121:6 - [c85]Samuel Marchal, Kalle Saari, Nidhi Singh, N. Asokan:
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets. ICDCS 2016: 323-333 - [c84]Giovanni Armano, Samuel Marchal, N. Asokan:
Real-Time Client-Side Phishing Prevention Add-On. ICDCS 2016: 777-778 - [c83]Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan:
Characterizing SEAndroid Policies in the Wild. ICISSP 2016: 482-489 - [c82]Kubilay Ahmet Küçük, Andrew Paverd, Andrew Martin, N. Asokan, Andrew Simpson, Robin Ankele:
Exploring the use of Intel SGX for Secure Many-Party Applications. SysTEX@Middleware 2016: 5:1-5:6 - [c81]Klaudia Krawiecka, Andrew Paverd, N. Asokan:
Protecting Password Databases using Trusted Hardware. SysTEX@Middleware 2016: 9:1-9:6 - [c80]Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, N. Asokan:
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks. NDSS 2016 - [c79]Altaf Shaik, Jean-Pierre Seifert, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi:
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. NDSS 2016 - [c78]Narges Yousefnezhad, Marcin Nagy, N. Asokan:
On improving tie strength estimates by aggregating multiple communication channels. Networking 2016: 530-535 - [c77]Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan, Ahmad-Reza Sadeghi:
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments. WISEC 2016: 225-226 - [i29]Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-FLow ATtestation for Embedded Systems Software. CoRR abs/1605.07763 (2016) - [i28]Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan:
The Circle Game: Scalable Private Membership Test Using Trusted Hardware. CoRR abs/1606.01655 (2016) - [i27]Elena Reshetova, Filippo Bonazzi, N. Asokan:
SELint: an SEAndroid policy analysis tool. CoRR abs/1608.02339 (2016) - [i26]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Towards Fairness of Cryptocurrency Payments. CoRR abs/1609.07256 (2016) - [i25]Mika Juuti, Christian Vaas, Ivo Sluganovic, Hans Liljestrand, N. Asokan, Ivan Martinovic:
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition. CoRR abs/1610.02801 (2016) - [i24]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT. CoRR abs/1611.04880 (2016) - [i23]Jian Liu, Wenting Li, Ghassan O. Karame, N. Asokan:
Scalable Byzantine Consensus via Hardware-assisted Secret Sharing. CoRR abs/1612.04997 (2016) - 2015
- [c76]Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula:
I Know Where You are: Proofs of Presence Resilient to Malicious Provers. AsiaCCS 2015: 567-577 - [c75]Jian Liu, N. Asokan, Benny Pinkas:
Secure Deduplication of Encrypted Data without Additional Independent Servers. CCS 2015: 874-885 - [c74]N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann:
SEDA: Scalable Embedded Device Attestation. CCS 2015: 964-975 - [c73]Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, N. Asokan:
Smart and Secure Cross-Device Apps for the Internet of Advanced Things. Financial Cryptography 2015: 272-290 - [c72]Imtiaj Ahmed, Yina Ye, Sourav Bhattacharya, N. Asokan, Giulio Jacucci, Petteri Nurmi, Sasu Tarkoma:
Checksum gestures: continuous gestures as an out-of-band channel for secure pairing. UbiComp 2015: 391-401 - [c71]Thomas Nyman, Brian McGillion, N. Asokan:
On Making Emerging Trusted Execution Environments Accessible to Developers. TRUST 2015: 58-67 - [c70]Sourav Bhattacharya, Otto Huhta, N. Asokan:
LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling. TRUST 2015: 143-162 - [c69]Brian McGillion, Tanel Dettenborn, Thomas Nyman, N. Asokan:
Open-TEE - An Open Virtual Trusted Execution Environment. TrustCom/BigDataSE/ISPA (1) 2015: 400-407 - [c68]Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jörg Ott, Ahmad-Reza Sadeghi:
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL. WISEC 2015: 18:1-18:12 - [c67]Marcin Nagy, Thanh Bui, Swapnil Udar, N. Asokan, Jörg Ott:
SpotShare and nearbyPeople: applications of the Social PaL framework. WISEC 2015: 31:1-31:2 - [i22]Sourav Bhattacharya, Otto Huhta, N. Asokan:
LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling. CoRR abs/1504.04730 (2015) - [i21]Otto Huhta, Prakash Shrestha, Swapnil Udar, Nitesh Saxena, N. Asokan:
Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication. CoRR abs/1505.05779 (2015) - [i20]Brian McGillion, Tanel Dettenborn, Thomas Nyman, N. Asokan:
Open-TEE - An Open Virtual Trusted Execution Environment. CoRR abs/1506.07367 (2015) - [i19]Thomas Nyman, Brian McGillion, N. Asokan:
On Making Emerging Trusted Execution Environments Accessible to Developers. CoRR abs/1506.07739 (2015) - [i18]Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan:
Characterizing SEAndroid Policies in the Wild. CoRR abs/1510.05497 (2015) - [i17]Samuel Marchal, Kalle Saari, Nidhi Singh, N. Asokan:
Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets. CoRR abs/1510.06501 (2015) - [i16]Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, Jean-Pierre Seifert:
Practical attacks against privacy and availability in 4G/LTE mobile communication systems. CoRR abs/1510.07563 (2015) - [i15]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Contextual Proximity Detection in the Face of Context-Manipulating Adversaries. CoRR abs/1511.00905 (2015) - [i14]Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar Pendyala, Andrew Paverd, N. Asokan, Ahmad-Reza Sadeghi:
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices. CoRR abs/1511.02119 (2015) - [i13]Jian Liu, N. Asokan, Benny Pinkas:
Secure Deduplication of Encrypted Data without Additional Independent Servers. IACR Cryptol. ePrint Arch. 2015: 455 (2015) - 2014
- [j13]Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
The Untapped Potential of Trusted Execution Environments on Mobile Devices. IEEE Secur. Priv. 12(4): 29-37 (2014) - [j12]N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos V. Rozas, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann:
Mobile Trusted Computing. Proc. IEEE 102(8): 1189-1206 (2014) - [c66]Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Citizen Electronic Identities using TPM 2.0. TrustED@CCS 2014: 37-48 - [c65]Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan:
ConXsense: automated context classification for context-aware access control. AsiaCCS 2014: 293-304 - [c64]Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani:
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. CCS 2014: 880-891 - [c63]Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. Financial Cryptography 2014: 349-364 - [c62]Eemil Lagerspetz, Hien Thi Thu Truong, Sasu Tarkoma, N. Asokan:
MDoctor: A Mobile Malware Prognosis Application. ICDCS Workshops 2014: 201-206 - [c61]Jian Liu, Sini Ruohomaa, Kumaripaba Athukorala, Giulio Jacucci, N. Asokan, Janne Lindqvist:
Groupsourcing: nudging users away from unsafe content. NordiCHI 2014: 883-886 - [c60]Elena Reshetova, Janne Karhunen, Thomas Nyman, N. Asokan:
Security of OS-Level Virtualization Technologies. NordSec 2014: 77-93 - [c59]Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N. Asokan, Petteri Nurmi:
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication. PerCom 2014: 163-171 - [c58]N. Asokan:
On mobile malware infections. WISEC 2014: 37-38 - [c57]Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya:
The company you keep: mobile malware infection rates and inexpensive risk indicators. WWW 2014: 39-50 - [i12]Elena Reshetova, Janne Karhunen, Thomas Nyman, N. Asokan:
Security of OS-level virtualization technologies: Technical report. CoRR abs/1407.4245 (2014) - [i11]Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Citizen Electronic Identities using TPM 2.0. CoRR abs/1409.1023 (2014) - [i10]Marcin Nagy, Thanh Bui, Emiliano De Cristofaro, N. Asokan, Jörg Ott, Ahmad-Reza Sadeghi:
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL. CoRR abs/1412.2433 (2014) - 2013
- [b2]N. Asokan, Lucas Vincenzo Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi:
Mobile Platform Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01213-6 - [c56]N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, Stanislaus Stelle:
CrowdShare: Secure Mobile Resource Sharing. ACNS 2013: 432-440 - [c55]Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi:
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. ACSAC 2013: 159-168 - [c54]Adrienne Porter Felt, N. Asokan:
CCS'13 co-located workshop summary for SPSM 2013. CCS 2013: 1489-1490 - [c53]Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Trusted execution environments on mobile devices. CCS 2013: 1497-1498 - [c52]N. Asokan, Jan-Erik Ekberg, Kari Kostiainen:
The Untapped Potential of Trusted Execution Environments on Mobile Devices. Financial Cryptography 2013: 293-294 - [c51]Marcin Nagy, N. Asokan, Jörg Ott:
PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts. NordSec 2013: 154-165 - [e5]William Enck, Adrienne Porter Felt, N. Asokan:
SPSM'13, Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013, November 8, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2491-5 [contents] - [e4]Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp:
Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7904, Springer 2013, ISBN 978-3-642-38907-8 [contents] - [i9]Marcin Nagy, N. Asokan, Jörg Ott:
PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts. CoRR abs/1307.4046 (2013) - [i8]Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan:
ConXsense - Context Sensing for Adaptive Usable Access Control. CoRR abs/1308.2903 (2013) - [i7]Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya:
The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators. CoRR abs/1312.3245 (2013) - [i6]Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi:
Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications. IACR Cryptol. ePrint Arch. 2013: 620 (2013) - 2012
- [c50]N. Asokan, Cynthia Kuo:
Usable Mobile Security. ICDCIT 2012: 1-6 - [c49]Aditi Gupta, Markus Miettinen, Marcin Nagy, N. Asokan, Alexandre Wetzel:
PeerSense: Who is near you? PerCom Workshops 2012: 516-518 - [c48]Aditi Gupta, Markus Miettinen, N. Asokan, Marcin Nagy:
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling. SocialCom/PASSAT 2012: 471-480 - [c47]Jan-Erik Ekberg, Alexandra Afanasyeva, N. Asokan:
Authenticated Encryption Primitives for Size-Constrained Trusted Computing. TRUST 2012: 1-18 - [c46]Pern Hui Chia, Yusuke Yamamoto, N. Asokan:
Is this app safe?: a large scale study on application permissions and risk signals. WWW 2012: 311-320 - 2011
- [j11]Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing Based on a Visual Channel: Design and Usability Study. IEEE Trans. Inf. Forensics Secur. 6(1): 28-38 (2011) - [c45]Kari Kostiainen, N. Asokan, Alexandra Afanasyeva:
Towards User-Friendly Credential Transfer on Open Credential Platforms. ACNS 2011: 395-412 - [c44]Sandeep Tamrakar, Jan-Erik Ekberg, N. Asokan:
Identity verification schemes for public transport ticketing with NFC phones. STC@CCS 2011: 37-48 - [c43]Kari Kostiainen, N. Asokan:
Credential life cycle management in open credential platforms (short paper). STC@CCS 2011: 65-70 - [c42]Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg, N. Asokan:
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures. CODASPY 2011: 13-24 - [c41]John Solis, Philip Ginzboorg, N. Asokan, Jörg Ott:
Best-effort authentication for opportunistic networks. IPCCC 2011: 1-6 - [c40]Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris, N. Asokan:
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags. PerCom 2011: 181-188 - [c39]Aditi Gupta, Markus Miettinen, N. Asokan:
Using context-profiling to aid access control decisions in mobile devices. PerCom Workshops 2011: 310-312 - [c38]Kari Kostiainen, N. Asokan, Jan-Erik Ekberg:
Practical Property-Based Attestation on Mobile Devices. TRUST 2011: 78-92 - [e3]Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan:
Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8 [contents] - 2010
- [j10]John Solis, N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott:
Controlling resource hogs in mobile delay-tolerant networks. Comput. Commun. 33(1): 2-10 (2010) - [c37]Markus Miettinen, N. Asokan:
Towards security policy decisions based on context profiling. AISec 2010: 19-23 - [c36]Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, Tuomas Aura:
Can Hand-Held Computers Still Be Better Smart Cards? INTRUST 2010: 200-218 - [c35]Pern Hui Chia, Andreas P. Heiner, N. Asokan:
Use of Ratings from Personalized Communities for Trustworthy Application Installation. NordSec 2010: 71-88 - [c34]Kari Kostiainen, N. Asokan, Jan-Erik Ekberg:
Credential Disabling from Trusted Execution Environments. NordSec 2010: 171-186 - [c33]Paul Dunphy, Andreas P. Heiner, N. Asokan:
A closer look at recognition-based graphical passwords on mobile devices. SOUPS 2010 - [c32]Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ekberg, Ahmad-Reza Sadeghi, N. Asokan:
Key Attestation from Trusted Execution Environments. TRUST 2010: 30-46 - [e2]Shouhuai Xu, N. Asokan, Ahmad-Reza Sadeghi:
Proceedings of the fifth ACM workshop on Scalable trusted computing, STC@CCS 2010, Chicago, IL, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0095-7 [contents]
2000 – 2009
- 2009
- [j9]Jani Suomalainen, Jukka Valkonen, N. Asokan:
Standards for security associations in personal networks: a comparative analysis. Int. J. Secur. Networks 4(1/2): 87-100 (2009) - [c31]Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala:
On-board credentials with open provisioning. AsiaCCS 2009: 104-115 - [c30]Jan-Erik Ekberg, N. Asokan:
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing. INTRUST 2009: 16-38 - [e1]Shouhuai Xu, N. Asokan, Cristina Nita-Rotaru, Jean-Pierre Seifert:
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-788-2 [contents] - 2008
- [c29]Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala:
Scheduling execution of credentials in constrained secure environments. STC 2008: 61-70 - [c28]N. Asokan, Jan-Erik Ekberg:
A Platform for OnBoard Credentials. Financial Cryptography 2008: 318-320 - [c27]Long Nguyen Hoang, Pekka Laitinen, N. Asokan:
Secure roaming with identity metasystems. IDtrust 2008: 36-47 - [c26]André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan:
Securing Peer-to-Peer Distributions for Mobile Devices. ISPEC 2008: 161-175 - [c25]Andreas P. Heiner, N. Asokan:
Using Salience Differentials to Making Visual Cues Noticeable. UPSEC 2008 - 2007
- [c24]Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan:
Beyond secure channels. STC 2007: 30-40 - [c23]Jani Suomalainen, Jukka Valkonen, N. Asokan:
Security Associations in Personal Networks: A Comparative Analysis. ESAS 2007: 43-57 - [c22]Ersin Uzun, Kristiina Karvonen, N. Asokan:
Usability Analysis of Secure Pairing Methods. Financial Cryptography 2007: 307-324 - [c21]Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg:
Enabling Fairer Digital Rights Management with Trusted Computing. ISC 2007: 53-70 - [c20]N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo:
Applicability of identity-based cryptography for disruption-tolerant networking. MobiOpp@MobiSys 2007: 52-56 - [c19]Andreas P. Heiner, N. Asokan:
Secure software installation in a mobile environment. SOUPS 2007: 155-156 - 2006
- [c18]Jarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. Asokan:
Remote storage for mobile devices. COMSWARE 2006: 1-9 - [c17]Jukka Valkonen, N. Asokan, Kaisa Nyberg:
Ad Hoc Security Associations for Groups. ESAS 2006: 150-164 - [c16]Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing based on a Visual Channel (Short Paper). S&P 2006: 306-313 - [i5]Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing based on a Visual Channel. IACR Cryptol. ePrint Arch. 2006: 50 (2006) - 2005
- [c15]N. Asokan, Seamus Moloney, Philip Ginzboorg, Kari Kostiainen:
Visitor Access Management in Personal Wireless Networks. ISM 2005: 686-694 - [i4]Sven Laur, N. Asokan, Kaisa Nyberg:
Efficient Mutual Data Authentication Using Manually Authenticated Strings. IACR Cryptol. ePrint Arch. 2005: 424 (2005) - 2003
- [c14]Sampo Sovio, N. Asokan, Kaisa Nyberg:
Defining Authorization Domains Using Virtual Devices. SAINT Workshops 2003: 331-336 - [c13]N. Asokan, Valtteri Niemi, Kaisa Nyberg:
Man-in-the-Middle in Tunnelled Authentication Protocols. Security Protocols Workshop 2003: 28-41 - [c12]N. Asokan:
Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). Security Protocols Workshop 2003: 42-48 - 2002
- [c11]Helger Lipmaa, N. Asokan, Valtteri Niemi:
Secure Vickrey Auctions without Threshold Trust. Financial Cryptography 2002: 87-101 - [c10]Manel Guerrero Zapata, N. Asokan:
Securing ad hoc routing protocols. Workshop on Wireless Security 2002: 1-10 - [i3]N. Asokan, Valtteri Niemi, Kaisa Nyberg:
Man-in-the-Middle in Tunnelled Authentication Protocols. IACR Cryptol. ePrint Arch. 2002: 163 (2002) - 2001
- [c9]Henry Haverinen, N. Asokan, Tuomas Määttänen:
Authentication and key generation for mobile IP using GSM authentication and roaming. ICC 2001: 2453-2457 - [i2]Helger Lipmaa, N. Asokan, Valtteri Niemi:
Secure Vickrey Auctions without Threshold Trust. IACR Cryptol. ePrint Arch. 2001: 95 (2001) - 2000
- [j8]N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner:
State of the art in electronic payment systems. Adv. Comput. 53: 425-449 (2000) - [j7]N. Asokan, Philip Ginzboorg:
Key agreement in ad hoc networks. Comput. Commun. 23(17): 1627-1637 (2000) - [j6]N. Asokan, Victor Shoup, Michael Waidner:
Optimistic fair exchange of digital signatures. IEEE J. Sel. Areas Commun. 18(4): 593-610 (2000)
1990 – 1999
- 1999
- [j5]N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner:
Authenticating public terminals. Comput. Networks 31(8): 861-870 (1999) - 1998
- [b1]N. Asokan:
Fairness in electronic commerce. IBM, Research report / RZ / IBM / IBM Research Division / Zürich Research Laboratory 3027, 1998, pp. I-XIII, 1-145 - [j4]José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner:
Designing a Generic Payment Service. IBM Syst. J. 37(1): 72-88 (1998) - [j3]Günter Karjoth, N. Asokan, Ceki Gülcü:
Protecting the Computation Results of Free-Roaming Agents. Pers. Ubiquitous Comput. 2(2): 92-99 (1998) - [c8]N. Asokan, Victor Shoup, Michael Waidner:
Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606 - [c7]Günter Karjoth, N. Asokan, Ceki Gülcü:
Protecting the Computation Results of Free-Roaming Agents. Mobile Agents 1998: 195-207 - [c6]N. Asokan, Victor Shoup, Michael Waidner:
Asynchronous Protocols for Optimistic Fair Exchange. S&P 1998: 86-99 - [c5]N. Asokan, Els Van Herreweghen, Michael Steiner:
Towards a Framework for Handling Disputes in Payment Systems. USENIX Workshop on Electronic Commerce 1998 - 1997
- [j2]N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner:
The State of the Art in Electronic Payment Systems. Computer 30(9): 28-35 (1997) - [j1]N. Asokan, Gene Tsudik, Michael Waidner:
Server-Supported Signatures. J. Comput. Secur. 5(1): 91-108 (1997) - [c4]N. Asokan, Matthias Schunter, Michael Waidner:
Optimistic Protocols for Fair Exchange. CCS 1997: 7-17 - [i1]N. Asokan, Victor Shoup, Michael Waidner:
Optimistic fair Exchange of Digital Signatures. IACR Cryptol. ePrint Arch. 1997: 15 (1997) - 1996
- [c3]N. Asokan, Gene Tsudik, Michael Waidner:
Server-Supported Signatures. ESORICS 1996: 131-143 - 1995
- [c2]Didier Samfat, Refik Molva, N. Asokan:
Untraceability in Mobile Networks. MobiCom 1995: 26-36 - 1994
- [c1]N. Asokan:
Anonymity in a Mobile Computing Environment. WMCSA 1994: 200-204
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint