关注
N. Asokan
N. Asokan
Professor of Computer Science, University of Waterloo
在 uwaterloo.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Securing ad hoc routing protocols
MG Zapata, N Asokan
Proceedings of the 1st ACM workshop on Wireless security, 1-10, 2002
11822002
Optimistic protocols for fair exchange
N Asokan, M Schunter, M Waidner
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
7231997
Key agreement in ad hoc networks
N Asokan, P Ginzboorg
Computer communications 23 (17), 1627-1637, 2000
6662000
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
IEEE Journal on Selected Areas in communications 18 (4), 593-610, 2000
5642000
Iot sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
5582017
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
International Conference on the Theory and Applications of Cryptographic …, 1998
5541998
Oblivious neural network predictions via minionn transformations
J Liu, M Juuti, Y Lu, N Asokan
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
5052017
Asynchronous protocols for optimistic fair exchange
N Asokan, V Shoup, M Waidner
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
4901998
State of the art in electronic payment systems
N Asokan, P Janson, M Steiner, M Waidner
Advances in Computers 53, 425-449, 2000
4092000
State of the art in electronic payment systems
N Asokan, PA Janson, M Steiner, M Waidner
IEEE Computer 30 (9), 28-35, 1997
4091997
DÏoT: A federated self-learning anomaly detection system for IoT
TD Nguyen, S Marchal, M Miettinen, H Fereidooni, N Asokan, AR Sadeghi
2019 IEEE 39th International conference on distributed computing systems …, 2019
353*2019
Man-in-the-middle in tunnelled authentication protocols
N Asokan, V Niemi, K Nyberg
International Workshop on Security Protocols, 28-41, 2003
3442003
Digital rights management in a mobile communications environment
M Kontio, Z Honglang, P Gustafsson, J Durand, N Asokan, JE Ekberg, ...
US Patent App. 10/482,918, 2004
3412004
Authentication in a packet data network
H Haverinen, JP Honkanen, A Kuikka, N Asokan, P Flykt, J Ala-Laurila, ...
US Patent 7,107,620, 2006
2992006
Fairness in electronic commerce
N Asokan
University of Waterloo, 1998
2941998
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
A Shaik, R Borgaonkar, N Asokan, V Niemi, JP Seifer
NDSS 2016, 2016
2912016
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
PH Chia, Y Yamamoto, N Asokan
2862012
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
2642006
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
International Workshop on Mobile Agents, 195-207, 1998
2641998
C-FLAT: control-flow attestation for embedded systems software
T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2452016
系统目前无法执行此操作,请稍后再试。
文章 1–20