Kimmo Halunen
Orcid: 0000-0003-1169-5920
According to our database1,
Kimmo Halunen
authored at least 42 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Research Versus Practice in Quantum Software Engineering: Experiences From Credit Scoring Use Case.
IEEE Softw., 2024
What is an AI Vulnerability, and Why Should We Care? Unpacking the Relationship between AI Security and AI Ethics.
Proceedings of the Conference on Technology Ethics 2024 (Tethics 2024), 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Product-Focused Software Process Improvement. Industry-, Workshop-, and Doctoral Symposium Papers, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
Proceedings of the 7th International Conference on Internet of Things, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the Human-Centered Software Engineering, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Comput. Sci. Rev., 2021
Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021
2020
A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms.
Proceedings of the Human-Centered Software Engineering, 2020
2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
2017
Pervasive Mob. Comput., 2017
Proceedings of the 2nd International Conference on Internet of Things, 2017
Proceedings of the 11th European Conference on Software Architecture, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2014
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2012
Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions.
PhD thesis, 2012
2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis - (Short Paper).
Proceedings of the Critical Information Infrastructure Security, 2011
2010
J. Math. Cryptol., 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the 2nd USENIX Workshop on Offensive Technologies, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the The Third International Conference on Availability, 2008