Jussipekka Leiwo
According to our database1,
Jussipekka Leiwo
authored at least 27 papers
between 1997 and 2008.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2008
J. Syst. Archit., 2008
2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
The design of multiplierless FIR filters with a minimum adder step and reduced hardware complexity.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Int. J. Softw. Eng. Knowl. Eng., 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Efficient high radix modular multiplication for high-speed computing in re-configurable hardware [cryptographic applications].
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2000
Proceedings of the Security Protocols, 2000
Disallowing Unauthorized State Changes of Distributed Shared Objects.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Towards Network Denial of Service Resistant Protocols.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999
Organizational Modeling for Efficient Specification of Information Security Requirements.
Proceedings of the Advances in Databases and Information Systems, 1999
1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
1997
A formal model to aid documenting and harmonizing of information security requirements.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997