default search action
Kimmo Halunen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Petri Liimatta, Pauli Taipale, Kimmo Halunen, Teiko Heinosaari, Tommi Mikkonen, Vlad Stirbu:
Research Versus Practice in Quantum Software Engineering: Experiences From Credit Scoring Use Case. IEEE Softw. 41(6): 9-16 (2024) - [c32]Markus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt:
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence. ARES 2024: 69:1-69:11 - [c31]Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning:
Automating IoT Security Standard Testing by Common Security Tools. ICISSP 2024: 42-53 - [c30]Sara Nikula, Anssi Lintulampi, Kimmo Halunen:
Security Analysis for BB84 Key Distillation. SECRYPT 2024: 407-415 - 2023
- [j4]Julius Hekkala, Mari Muurman, Kimmo Halunen, Visa Antero Vallivaara:
Implementing Post-quantum Cryptography for Developers. SN Comput. Sci. 4(4): 365 (2023) - [c29]Rauli Kaksonen, Kimmo Halunen, Juha Röning:
Vulnerabilities in IoT Devices, Backends, Applications, and Components. ICISSP 2023: 659-668 - [c28]Rauli Kaksonen, Kimmo Halunen, Marko Laakso, Juha Röning:
Transparent Security Method for Automating IoT Security Assessments. ISPEC 2023: 138-153 - 2022
- [c27]Markus Rautell, Outi-Marja Latvala, Visa Antero Vallivaara, Kimmo Halunen:
Applying a cryptographic metric to post-quantum lattice-based signature algorithms. ARES 2022: 87:1-87:8 - [c26]Sara Nikula, Célia Martinie, Philippe A. Palanque, Julius Hekkala, Outi-Marja Latvala, Kimmo Halunen:
Models-Based Analysis of Both User and Attacker Tasks: Application to EEVEHAC. HCSE 2022: 70-89 - [c25]Julius Hekkala, Kimmo Halunen, Visa Antero Vallivaara:
Implementing Post-quantum Cryptography for Developers. ICISSP 2022: 73-83 - [c24]Rauli Kaksonen, Kimmo Halunen, Juha Röning:
Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines. IoTBDS 2022: 149-156 - 2021
- [j3]Kimmo Halunen, Outi-Marja Latvala:
Review of the use of human senses and capabilities in cryptography. Comput. Sci. Rev. 39: 100340 (2021) - [c23]Niko Lehto, Kimmo Halunen, Outi-Marja Latvala, Anni Karinsalo, Jarno Salonen:
CryptoVault - A Secure Hardware Wallet for Decentralized Key Management. COINS 2021: 1-4 - [c22]Julius Hekkala, Sara Nikula, Outi-Marja Latvala, Kimmo Halunen:
Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC. SECRYPT 2021: 659-664 - 2020
- [c21]Nicolas Broders, Célia Martinie, Philippe A. Palanque, Marco Winckler, Kimmo Halunen:
A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms. HCSE 2020: 61-83
2010 – 2019
- 2018
- [c20]Outi-Marja Latvala, Chengyuan Peng, Petri Honkamaa, Kimmo Halunen:
"Speak, Friend, and Enter" - Secure, Spoken One-Time Password Authentication. NTMS 2018: 1-5 - [c19]Kimmo Halunen, Visa Antero Vallivaara, Anni Karinsalo:
On the Similarities between Blockchains and Merkle-Damgård Hash Functions. QRS Companion 2018: 129-134 - [c18]Anni Karinsalo, Kimmo Halunen:
Smart Contracts for a Mobility-as-a-Service Ecosystem. QRS Companion 2018: 135-138 - [i1]Kimmo Halunen, Outi-Marja Latvala:
Cryptography for Human Senses. IACR Cryptol. ePrint Arch. 2018: 757 (2018) - 2017
- [j2]Kimmo Halunen, Juha Häikiö, Visa Antero Vallivaara:
Evaluation of user authentication methods in the gadget-free world. Pervasive Mob. Comput. 40: 220-241 (2017) - [c17]Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö:
n-Auth: Mobile Authentication Done Right. ACSAC 2017: 1-15 - [c16]Kimmo Halunen, Anni Karinsalo:
Measuring the value of privacy and the efficacy of PETs. ECSA (Companion) 2017: 132-135 - [c15]Jari Kreku, Visa Antero Vallivaara, Kimmo Halunen, Jani Suomalainen:
Evaluating the Efficiency of Blockchains in IoT with Simulations. IoTBDS 2017: 216-223 - 2016
- [c14]Filipe Beato, Kimmo Halunen, Bart Mennink:
Improving the Sphinx Mix Network. CANS 2016: 681-691 - [c13]Filipe Beato, Kimmo Halunen, Bart Mennink:
Recipient Privacy in Online Social Networks. IWSEC 2016: 254-264 - [c12]Kimmo Halunen, Visa Antero Vallivaara:
Secure, Usable and Privacy-Friendly User Authentication from Keystroke Dynamics. NordSec 2016: 256-268 - 2014
- [c11]Visa Antero Vallivaara, Mirko Sailio, Kimmo Halunen:
Detecting man-in-the-middle attacks on non-mobile systems. CODASPY 2014: 131-134 - [c10]Kimmo Halunen, Mirko Sailio:
Identity-Based Cryptography in Credit Card Payments. CSS 2014: 49-58 - 2012
- [b1]Kimmo Halunen:
Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions. University of Oulu, Finland, 2012 - 2011
- [c9]Thomas Schaberreiter, Kati Kittilä, Kimmo Halunen, Juha Röning, Djamel Khadraoui:
Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper). CRITIS 2011: 213-217 - [c8]Kimmo Halunen:
Multicollisions and Graph-Based Hash Functions. INTRUST 2011: 156-167 - 2010
- [j1]Juha Kortelainen, Kimmo Halunen, Tuomas Kortelainen:
Multicollision attacks and generalized iterated hash functions. J. Math. Cryptol. 4(3): 239-270 (2010) - [c7]Kimmo Halunen, Juha Kortelainen, Tuomas Kortelainen:
Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions. AISC 2010: 86-93 - [c6]Tuomas Kortelainen, Juha Kortelainen, Kimmo Halunen:
Variants of Multicollision Attacks on Iterated Hash Functions. Inscrypt 2010: 139-154 - [c5]Kimmo Halunen, Juha Röning:
Preimage Attacks against Variants of Very Smooth Hash. IWSEC 2010: 251-266
2000 – 2009
- 2009
- [c4]Kimmo Halunen, Pauli Rikula, Juha Röning:
Finding Preimages of Multiple Passwords Secured with VSH. ARES 2009: 499-503 - 2008
- [c3]Kimmo Halunen, Pauli Rikula, Juha Röning:
On the Security of VSH in Password Schemes. ARES 2008: 828-833 - [c2]Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning:
Vulnerability Dependencies in Antivirus Software. SECURWARE 2008: 273-278 - [c1]Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietikäinen, Mika Seppänen, Kimmo Halunen, Rauli Puuperä, Juha Röning:
Experiences with Model Inference Assisted Fuzzing. WOOT 2008
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint