default search action
Tuomas Aura
Person information
- affiliation: Microsoft Research
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Abu Shohel Ahmed, Aleksi Peltonen, Mohit Sethi, Tuomas Aura:
Security Analysis of the Consumer Remote SIM Provisioning Protocol. ACM Trans. Priv. Secur. 27(3): 23:1-23:36 (2024) - 2023
- [j15]Siddharth Prakash Rao, Hsin Yi Chen, Tuomas Aura:
Threat modeling framework for mobile communication systems. Comput. Secur. 125: 103047 (2023) - [c73]Jacopo Bufalino, Mario Di Francesco, Tuomas Aura:
Analyzing Microservice Connectivity with Kubesonde. ESEC/SIGSOFT FSE 2023: 2038-2043 - 2022
- [i11]Abu Shohel Ahmed, Aleksi Peltonen, Mohit Sethi, Tuomas Aura:
Security Analysis of the Consumer Remote SIM Provisioning Protocol. CoRR abs/2211.15323 (2022) - 2021
- [j14]Abu Shohel Ahmed, Mukesh Thakur, Santeri Paavolainen, Tuomas Aura:
Transparency of SIM profiles for the consumer remote SIM provisioning protocol. Ann. des Télécommunications 76(3-4): 187-202 (2021) - [j13]Mohit Sethi, Tuomas Aura:
Secure Network Access Authentication for IoT Devices: EAP Framework vs. Individual Protocols. IEEE Commun. Stand. Mag. 5(3): 34-39 (2021) - [c72]Sebastien Boire, Tolgahan Akgün, Philip Ginzboorg, Pekka Laitinen, Sandeep Tamrakar, Tuomas Aura:
Credential Provisioning and Device Configuration with EAP. MobiWac 2021: 87-96 - [i10]Tuomas Aura, Mohit Sethi, Aleksi Peltonen:
Nimble Out-of-Band Authentication for EAP (EAP-NOOB). RFC 9140: 1-51 (2021) - 2020
- [j12]Aleksi Peltonen, Mohit Sethi, Tuomas Aura:
Formal verification of misbinding attacks on secure device pairing and bootstrapping. J. Inf. Secur. Appl. 51: 102461 (2020) - [j11]Aleksi Peltonen, Eduardo Inglés, Sampsa Latvala, Dan García-Carrillo, Mohit Sethi, Tuomas Aura:
Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB. Sensors 20(21): 6101 (2020) - [j10]Sampsa Latvala, Mohit Sethi, Tuomas Aura:
Evaluation of Out-of-Band Channels for IoT Security. SN Comput. Sci. 1(1): 18:1-18:17 (2020) - [c71]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
XSS Vulnerabilities in Cloud-Application Add-Ons. AsiaCCS 2020: 610-621 - [i9]Siddharth Prakash Rao, Silke Holtmanns, Tuomas Aura:
Threat modeling framework for mobile communication systems. CoRR abs/2005.05110 (2020)
2010 – 2019
- 2019
- [c70]Mohit Sethi, Aleksi Peltonen, Tuomas Aura:
Misbinding Attacks on Secure Device Pairing and Bootstrapping. AsiaCCS 2019: 453-464 - [c69]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet. EuroSec@EuroSys 2019: 3:1-3:6 - [c68]Debopam Bhattacherjee, Andrei V. Gurtov, Tuomas Aura:
Watch Your Step! Detecting Stepping Stones in Programmable Networks. ICC 2019: 1-7 - [c67]Thanh Bui, Markku Antikainen, Tuomas Aura:
Analysis of Topology Poisoning Attacks in Software-Defined Networking. NordSec 2019: 87-102 - [c66]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
Client-Side Vulnerabilities in Commercial VPNs. NordSec 2019: 103-119 - [i8]Mohit Sethi, Aleksi Peltonen, Tuomas Aura:
Misbinding Attacks on Secure Device Pairing. CoRR abs/1902.07550 (2019) - [i7]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
XSS Vulnerabilities in Cloud-Application Add-Ons. CoRR abs/1911.12332 (2019) - [i6]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
Client-side Vulnerabilities in Commercial VPNs. CoRR abs/1912.04669 (2019) - 2018
- [j9]Alberto Geniola, Markku Antikainen, Tuomas Aura:
Automated analysis of freeware installers promoted by download portals. Comput. Secur. 77: 209-225 (2018) - [c65]Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Tuomas Aura:
Security Wrapper Orchestration in Cloud. ARES 2018: 29:1-29:6 - [c64]Thanh Bui, Tuomas Aura:
Application of Public Ledgers to Revocation in Distributed Access Control. ICICS 2018: 781-792 - [c63]Abu Shohel Ahmed, Tuomas Aura:
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure. TrustCom/BigDataSE 2018: 104-111 - [c62]Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Viswanathan Manihatty Bojan, Tuomas Aura:
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer. USENIX Security Symposium 2018: 1511-1525 - 2017
- [c61]Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura:
SynAPTIC: Secure And Persistent connecTIvity for Containers. CCGrid 2017: 262-267 - [c60]Alberto Geniola, Markku Antikainen, Tuomas Aura:
A Large-Scale Analysis of Download Portals and Freeware Installers. NordSec 2017: 209-225 - [c59]Thanh Bui, Tuomas Aura:
GPASS: A Password Manager with Group-Based Access Control. NordSec 2017: 229-244 - [c58]Thanh Bui, Tuomas Aura:
Key Exchange with the Help of a Public Ledger. Security Protocols Workshop 2017: 123-136 - [i5]Sanja Scepanovic, Igor Mishkovski, Jukka Ruohonen, Frederick Ayala-Gómez, Tuomas Aura, Sami Hyrynsalmi:
Malware distributions and graph structure of the Web. CoRR abs/1707.06071 (2017) - [i4]Thanh Bui, Tuomas Aura:
Key exchange with the help of a public ledger. CoRR abs/1708.03468 (2017) - 2016
- [c57]Siddharth Prakash Rao, Ian Oliver, Silke Holtmanns, Tuomas Aura:
We know where you are! CyCon 2016: 277-293 - [c56]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
Correlating file-based malware graphs against the empirical ground truth of DNS graphs. ECSA Workshops 2016: 30 - [c55]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet. EISIC 2016: 144-147 - [c54]Jukka Ruohonen, Sanja Scepanovic, Sami Hyrynsalmi, Igor Mishkovski, Tuomas Aura, Ville Leppänen:
The Black Mark beside My Name Server: Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs. FiCloud Workshops 2016: 264-269 - [c53]Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura:
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study. NOMS 2016: 281-288 - [i3]Thanh Bui, Tuomas Aura:
Application of Public Ledgers to Revocation in Distributed Access Control. CoRR abs/1608.06592 (2016) - 2015
- [c52]Aapo Kalliola, Kiryong Lee, Heejo Lee, Tuomas Aura:
Flooding DDoS mitigation and traffic management with software defined networking. CloudNet 2015: 248-254 - [c51]Mohit Sethi, Pranvera Kortoçi, Mario Di Francesco, Tuomas Aura:
Secure and low-power authentication for resource-constrained devices. IOT 2015: 30-36 - [c50]Sanna Suoranta, Lari Haataja, Tuomas Aura:
Electronic Citizen Identities and Strong Authentication. NordSec 2015: 213-230 - [c49]Siddharth Prakash Rao, Silke Holtmanns, Ian Oliver, Tuomas Aura:
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access. TrustCom/BigDataSE/ISPA (1) 2015: 1171-1176 - [c48]Alireza Ranjbar, Markku Antikainen, Tuomas Aura:
Domain Isolation in a Multi-tenant Software-Defined Network. UCC 2015: 16-25 - [c47]Mohit Sethi, Maria Lijding, Mario Di Francesco, Tuomas Aura:
Flexible Management of Cloud-Connected Digital Signage. UIC/ATC/ScalCom 2015: 205-212 - 2014
- [j8]Sanna Suoranta, Kamran Manzoor, Asko Tontti, Joonas Ruuskanen, Tuomas Aura:
Logout in single sign-on systems: Problems and solutions. J. Inf. Secur. Appl. 19(1): 61-77 (2014) - [j7]Gautham V. Pallapa, Sajal K. Das, Mario Di Francesco, Tuomas Aura:
Adaptive and context-aware privacy preservation exploiting user interactions in smart environments. Pervasive Mob. Comput. 12: 232-243 (2014) - [j6]Markku Antikainen, Tuomas Aura, Mikko Särelä:
Denial-of-Service Attacks in Bloom-Filter-Based Forwarding. IEEE/ACM Trans. Netw. 22(5): 1463-1476 (2014) - [c46]Aapo Kalliola, Tuomas Aura:
Spatially Aware Malware Infection Modeling Framework. CIT 2014: 288-292 - [c45]Mohit Sethi, Elena Oat, Mario Di Francesco, Tuomas Aura:
Secure bootstrapping of cloud-managed ubiquitous displays. UbiComp 2014: 739-750 - [c44]Aapo Kalliola, Tuomas Aura, Sanja Scepanovic:
Denial-of-Service Mitigation for Internet Services. NordSec 2014: 213-228 - [c43]Markku Antikainen, Tuomas Aura, Mikko Särelä:
Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch. NordSec 2014: 229-244 - [c42]Mohit Sethi, Markku Antikainen, Tuomas Aura:
Commitment-based device pairing with synchronized drawing. PerCom 2014: 181-189 - [c41]Elena Oat, Mario Di Francesco, Tuomas Aura:
MoCHA: Augmenting pervasive displays through mobile devices and web-based technologies. PerCom Workshops 2014: 506-511 - 2013
- [c40]Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura:
Logout in Single Sign-on Systems. IDMAN 2013: 147-160 - 2012
- [c39]Sajjad Rizvi, András Zahemszky, Tuomas Aura:
Scaling Bloom filter based multicast with hierarchical tree splitting. ICC 2012: 2790-2795 - [c38]Sanna Suoranta, André Andrade, Tuomas Aura:
Strong Authentication with Mobile Phone. ISC 2012: 70-85 - [e1]Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg:
Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers. Lecture Notes in Computer Science 7127, Springer 2012, ISBN 978-3-642-27936-2 [contents] - 2011
- [c37]Rasib Hassan Khan, Miika Komu, Tuomas Aura:
Applicability analysis of grid security mechanisms on cloud networking. CDC 2011: 65-70 - [c36]Mikko Särelä, Christian Esteve Rothenberg, Tuomas Aura, András Zahemszky, Pekka Nikander, Jörg Ott:
Forwarding anomalies in Bloom filter-based multicast. INFOCOM 2011: 2399-2407 - [c35]Pin Nie, Juho Vähä-Herttua, Tuomas Aura, Andrei V. Gurtov:
Performance analysis of HIP diet exchange for WSN security establishment. Q2SWinet 2011: 51-56 - [c34]Viet Pham, Tuomas Aura:
Security Analysis of Leap-of-Faith Protocols. SecureComm 2011: 337-355 - 2010
- [j5]Bo Li, Elena Reshetova, Tuomas Aura:
Symbian OS Platform Security Model. login Usenix Mag. 35(4) (2010) - [c33]Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen, N. Asokan, Tuomas Aura:
Can Hand-Held Computers Still Be Better Smart Cards? INTRUST 2010: 200-218 - [c32]George Danezis, Tuomas Aura, Shuo Chen, Emre Kiciman:
How to Share Your Favourite Search Results while Preserving Privacy and Quality. Privacy Enhancing Technologies 2010: 273-290
2000 – 2009
- 2009
- [c31]Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe:
Privacy-preserving 802.11 access-point discovery. WISEC 2009: 123-130 - 2008
- [c30]Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed:
Chattering Laptops. Privacy Enhancing Technologies 2008: 167-186 - 2007
- [c29]Tuomas Aura, Michael Roe, Steven J. Murdoch:
Securing network location awareness with authenticated DHCP. SecureComm 2007: 391-402 - [c28]Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zielinski:
Reconciling Multiple IPsec and Firewall Policies. Security Protocols Workshop 2007: 81-97 - 2006
- [j4]Tuomas Aura, Michael Roe:
Designing the mobile IPv6 security protocol. Ann. des Télécommunications 61(3-4): 332-356 (2006) - [j3]Tuomas Aura:
Why you shouldn't study security [security education]. IEEE Secur. Priv. 4(3): 74-76 (2006) - [c27]Tuomas Aura, Thomas A. Kuhn, Michael Roe:
Scanning electronic documents for personally identifiable information. WPES 2006: 41-50 - 2005
- [c26]Tuomas Aura, Aarthi Nagarajan, Andrei V. Gurtov:
Analysis of the HIP Base Exchange Protocol. ACISP 2005: 481-493 - [c25]Tuomas Aura, Michael Roe:
Reducing Reauthentication Delay in Wireless Networks. SecureComm 2005: 139-148 - [c24]Tuomas Aura, Michael Roe, Anish Mohammed:
Experiences with Host-to-Host IPsec. Security Protocols Workshop 2005: 3-22 - [c23]Tuomas Aura:
Experiences with Host-to-Host IPsec. Security Protocols Workshop 2005: 23-30 - [i2]Tuomas Aura:
Cryptographically Generated Addresses (CGA). RFC 3972: 1-22 (2005) - [i1]Pekka Nikander, Jari Arkko, Tuomas Aura, Gabriel Montenegro, Erik Nordmark:
Mobile IP Version 6 Route Optimization Security Design Background. RFC 4225: 1-37 (2005) - 2004
- [c22]Tuomas Aura, Pekka Nikander, Gonzalo Camarillo:
Effects of Mobility and Multihoming on Transport-Protocol Security. S&P 2004: 12-26 - [c21]Tuomas Aura, Alf Zugenmaier:
Privacy, Control and Internet Mobility. Security Protocols Workshop 2004: 133-145 - [c20]Tuomas Aura:
Privacy, Control and Internet Mobility (Transcript of Discussion). Security Protocols Workshop 2004: 146-150 - 2003
- [c19]Tuomas Aura:
Cryptographically Generated Addresses (CGA). ISC 2003: 29-43 - 2002
- [c18]Tuomas Aura, Michael Roe, Jari Arkko:
Security of Internet Location Management. ACSAC 2002: 78-87 - [c17]Tuomas Aura:
Mobile IPv6 Security. Security Protocols Workshop 2002: 215-234 - [c16]Jari Arkko, Tuomas Aura, James Kempf, Vesa-Matti Mäntylä, Pekka Nikander, Michael Roe:
Securing IPv6 neighbor and router discovery. Workshop on Wireless Security 2002: 77-86 - 2001
- [j2]Tuomas Aura, Dieter Gollmann:
Communications security on the internet. Softw. Focus 2(3): 104-111 (2001) - [c15]Tuomas Aura, Silja Mäki:
Towards a Survivable Security Architecture for Ad-Hoc Networks. Security Protocols Workshop 2001: 63-73 - 2000
- [j1]Tuomas Aura, Johan Lilius:
A causal semantics for time Petri nets. Theor. Comput. Sci. 243(1-2): 409-447 (2000) - [c14]Tuomas Aura, Matt Bishop, Dean Sniegowski:
Analyzing Single-Server Network Inhibition. CSFW 2000: 108-117 - [c13]Jussipekka Leiwo, Tuomas Aura, Pekka Nikander:
Towards Network Denial of Service Resistant Protocols. SEC 2000: 301-310 - [c12]John R. Hughes, Tuomas Aura, Matt Bishop:
Using Conservation of Flow as a Security Mechanism in Network Protocols. S&P 2000: 132-141 - [c11]Tuomas Aura, Pekka Nikander, Jussipekka Leiwo:
DOS-Resistant Authentication with Client Puzzles. Security Protocols Workshop 2000: 170-177 - [c10]Tuomas Aura:
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). Security Protocols Workshop 2000: 178-181
1990 – 1999
- 1999
- [c9]Tuomas Aura:
Distributed Access-Rights Managements with Delegations Certificates. Secure Internet Programming 1999: 211-235 - [c8]Tuomas Aura, Dieter Gollmann:
Software License Management with Smart Cards. Smartcard 1999 - 1998
- [c7]Tuomas Aura:
Fast Access Control Decisions from Delegation Certificate Databases. ACISP 1998: 284-295 - [c6]Tuomas Aura:
On the Structure of Delegation Networks. CSFW 1998: 14-26 - [c5]Tuomas Aura, Petteri Koponen, Juhana Räsänen:
Delegation-Based Control for Intelligent Network Services. ECOOP Workshops 1998: 284 - 1997
- [c4]Tuomas Aura, Johan Lilius:
Time Processes for Time Petri-Nets. ICATPN 1997: 136-155 - [c3]Tuomas Aura:
Strategies against Replay Attacks. CSFW 1997: 59-69 - [c2]Tuomas Aura, Pekka Nikander:
Stateless connections. ICICS 1997: 87-97 - 1996
- [c1]Tuomas Aura:
Practical Invisibility in Digital Communication. Information Hiding 1996: 265-278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint