dblp.uni-trier.dewww.uni-trier.de

N. Asokan Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
34EEKari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala: On-board credentials with open provisioning. ASIACCS 2009: 104-115
33EEJani Suomalainen, Jukka Valkonen, N. Asokan: Standards for security associations in personal networks: a comparative analysis. IJSN 4(1/2): 87-100 (2009)
2008
32EEN. Asokan, Jan-Erik Ekberg: A Platform for OnBoard Credentials. Financial Cryptography 2008: 318-320
31EELong Nguyen Hoang, Pekka Laitinen, N. Asokan: Secure roaming with identity metasystems. IDtrust 2008: 36-47
30EEAndré Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan: Securing Peer-to-Peer Distributions for Mobile Devices. ISPEC 2008: 161-175
29EEJan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala: Scheduling execution of credentials in constrained secure environments. STC 2008: 61-70
28EEAndreas P. Heiner, N. Asokan: Using Salience Differentials to Making Visual Cues Noticeable. UPSEC 2008
2007
27EEJani Suomalainen, Jukka Valkonen, N. Asokan: Security Associations in Personal Networks: A Comparative Analysis. ESAS 2007: 43-57
26EEErsin Uzun, Kristiina Karvonen, N. Asokan: Usability Analysis of Secure Pairing Methods. Financial Cryptography 2007: 307-324
25EEAhmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg: Enabling Fairer Digital Rights Management with Trusted Computing. ISC 2007: 53-70
24EEAndreas P. Heiner, N. Asokan: Secure software installation in a mobile environment. SOUPS 2007: 155-156
23EEYacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, N. Asokan: Beyond secure channels. STC 2007: 30-40
2006
22 Jarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. Asokan: Remote storage for mobile devices. COMSWARE 2006
21EEJukka Valkonen, N. Asokan, Kaisa Nyberg: Ad Hoc Security Associations for Groups. ESAS 2006: 150-164
20EENitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan: Secure Device Pairing based on a Visual Channel (Short Paper). IEEE Symposium on Security and Privacy 2006: 306-313
2005
19EEN. Asokan, Seamus Moloney, Philip Ginzboorg, Kari Kostiainen: Visitor Access Management in Personal Wireless Networks. ISM 2005: 686-694
2003
18EESampo Sovio, N. Asokan, Kaisa Nyberg: Defining Authorization Domains Using Virtual Devices. SAINT Workshops 2003: 331-336
17EEN. Asokan, Valtteri Niemi, Kaisa Nyberg: Man-in-the-Middle in Tunnelled Authentication Protocols. Security Protocols Workshop 2003: 28-41
16EEN. Asokan: Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). Security Protocols Workshop 2003: 42-48
2002
15EEHelger Lipmaa, N. Asokan, Valtteri Niemi: Secure Vickrey Auctions without Threshold Trust. Financial Cryptography 2002: 87-101
14EEManel Guerrero Zapata, N. Asokan: Securing ad hoc routing protocols. Workshop on Wireless Security 2002: 1-10
2000
13 N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: State of the art in electronic payment systems. Advances in Computers 53: 426-451 (2000)
12EEN. Asokan, Philip Ginzboorg: Key agreement in ad hoc networks. Computer Communications 23(17): 1627-1637 (2000)
1999
11EEN. Asokan, Hervé Debar, Michael Steiner, Michael Waidner: Authenticating public terminals. Computer Networks 31(8): 861-870 (1999)
1998
10EEN. Asokan, Victor Shoup, Michael Waidner: Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606
9EEN. Asokan, Victor Shoup, Michael Waidner: Asynchronous Protocols for Optimistic Fair Exchange. IEEE Symposium on Security and Privacy 1998: 86-99
8EEGünter Karjoth, N. Asokan, Ceki Gülcü: Protecting the Computation Results of Free-Roaming Agents. Mobile Agents 1998: 195-207
7 José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner: Designing a Generic Payment Service. IBM Systems Journal 37(1): 72-88 (1998)
6 Günter Karjoth, N. Asokan, Ceki Gülcü: Protecting the Computation Results of Free-Roaming Agents. Personal and Ubiquitous Computing 2(2): (1998)
1997
5EEN. Asokan, Matthias Schunter, Michael Waidner: Optimistic Protocols for Fair Exchange. ACM Conference on Computer and Communications Security 1997: 7-17
4 N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner: The State of the Art in Electronic Payment Systems. IEEE Computer 30(9): 28-35 (1997)
3 N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. Journal of Computer Security 5(1): 91-108 (1997)
1996
2EEN. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. ESORICS 1996: 131-143
1995
1EEDidier Samfat, Refik Molva, N. Asokan: Untraceability in Mobile Networks. MOBICOM 1995: 26-36

Coauthor Index

1Hervé Debar [11]
2Jan-Erik Ekberg [20] [25] [29] [32] [34]
3Yacine Gasmi [23]
4Philip Ginzboorg [12] [19]
5Ceki Gülcü [6] [8]
6Andreas P. Heiner [24] [28]
7Long Nguyen Hoang [31]
8Philippe A. Janson [4] [13]
9Günter Karjoth [6] [8]
10Kristiina Karvonen [26]
11Kari Kostiainen [19] [20] [29] [34]
12Pekka Laitinen [31]
13Jaakko Lipasti [22]
14Helger Lipmaa [15]
15Seamus Moloney [19]
16Refik Molva [1]
17Valtteri Niemi [15] [17]
18Kaisa Nyberg [17] [18] [21]
19André Osterhues [30]
20José L. Abad Peiro [7]
21Aarne Rantala [29] [34]
22Ahmad-Reza Sadeghi [23] [25] [30]
23Didier Samfat [1]
24Nitesh Saxena [20]
25Matthias Schunter [5]
26Victor Shoup [9] [10]
27Sampo Sovio [18]
28Michael Steiner [4] [7] [11] [13]
29Patrick Stewin [23]
30Christian Stüble [25] [30]
31Tapio Suihko [22]
32Jani Suomalainen [27] [33]
33Jarkko Tolvanen [22]
34Gene Tsudik [2] [3]
35Martin Unger [23]
36Ersin Uzun [26]
37Jukka Valkonen [21] [27] [33]
38Michael Waidner [2] [3] [4] [5] [7] [9] [10] [11] [13]
39Marko Wolf [25] [30]
40Manel Guerrero Zapata [14]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)