Tuomas Aura
Orcid: 0000-0003-1648-8875Affiliations:
- Microsoft Research
According to our database1,
Tuomas Aura
authored at least 94 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Priv. Secur., August, 2024
2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
2021
Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols.
IEEE Commun. Stand. Mag., 2021
Ann. des Télécommunications, 2021
Proceedings of the MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, Alicante, Spain, November 22, 2021
2020
Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB.
Sensors, 2020
Formal verification of misbinding attacks on secure device pairing and bootstrapping.
J. Inf. Secur. Appl., 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the Secure IT Systems, 2019
Proceedings of the Secure IT Systems, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 12th European Workshop on Systems Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Comput. Secur., 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the Security Protocols XXV, 2017
Proceedings of the Secure IT Systems, 2017
Proceedings of the Secure IT Systems, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016
A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016
Correlating file-based malware graphs against the empirical ground truth of DNS graphs.
Proceedings of the Proccedings of the 10th European Conference on Software Architecture Workshops, Copenhagen, Denmark, November 28, 2016
Proceedings of the 8th International Conference on Cyber Conflict, 2016
2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the 5th International Conference on the Internet of Things, 2015
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015
2014
IEEE/ACM Trans. Netw., 2014
Adaptive and context-aware privacy preservation exploiting user interactions in smart environments.
Pervasive Mob. Comput., 2014
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014
MoCHA: Augmenting pervasive displays through mobile devices and web-based technologies.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
Proceedings of the Policies and Research in Identity Management, 2013
2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Q2SWinet'11, Proceedings of the Seventh ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, FL, USA, October 31, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011
2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
2008
2007
Proceedings of the Security Protocols, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
2005
RFC, December, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Security Protocols, 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
2002
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the Security Protocols, 2001
2000
Proceedings of the Security Protocols, 2000
Proceedings of the Security Protocols, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Towards Network Denial of Service Resistant Protocols.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the 1st Workshop on Smartcard Technology, 1999
Proceedings of the Secure Internet Programming, 1999
1998
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997
Proceedings of the Application and Theory of Petri Nets 1997, 1997
1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996