Kari Kostiainen
Orcid: 0000-0002-9092-8683
According to our database1,
Kari Kostiainen
authored at least 58 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
CoRR, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Financial Cryptography and Data Security, 2019
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification.
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
2016
Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals.
CoRR, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception.
IACR Cryptol. ePrint Arch., 2015
Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms.
CoRR, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE Secur. Priv., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013
Proceedings of the SPSM'13, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
On-board Credentials: An open credential platform for mobile devices ; Avoin malli avainten ja salaisuuksien turvalliseen hallintaan mobiililaitteissa.
PhD thesis, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
2005
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005