N. Asokan

RSS feed of this list

  1. IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

    Miettinen, M., Marchal, S., Hafeez, I., Frassetto, T., Asokan, N., Sadeghi, A-R. & Tarkoma, S. A. O. 5 Jun 2017 p. 2511 2514 p.

    Publication: Conference contributionA4 Article in conference publication (refereed)

  2. IoTSENTINEL: Automated Device-Type Identification for Security Enforcement in IoT

    Miettinen, M., marchal, S., Hafeez, I., Asokan, N., Sadeghi, A-R. & Tarkoma, S. A. O. 5 Jun 2017 p. 2177 2184 p.

    Publication: Conference contributionA4 Article in conference publication (refereed)

  3. I know where you are: Proofs of presence resilient to malicious provers

    Miettinen, M., Asokan, N., Koushanfar, F., Nguyen, T. D., Rios, J., Sadeghi, A-R., Sobhani, M. & Yellapantula, S. 2015 p. 567-577 11 p.

    Publication: Conference contributionA4 Article in conference publication (refereed)

  4. How far removed are you?: Scalable privacy-preserving estimation of social path length with Social PaL

    Nagy, M., Bui, T., De Cristofaro, E., Asokan, N., Ott, J. & Sadeghi, A-R. 2015 12 p., 18

    Publication: Conference contributionA4 Article in conference publication (refereed)

  5. SEDA: Scalable Embedded Device Attestation

    Asokan, N., Brasser, F., Ibrahim, A., Sadeghi, A-R., Schunter, M., Tsudik, G. & Wachsmann, C. 2015 p. 964-975 12 p.

    Publication: Conference contributionA4 Article in conference publication (refereed)

  6. Smart and Secure Cross-Device Apps for the Internet of Advanced Things

    Busold, C., Heuser, S., Rios, J., Sadeghi, A-R. & Asokan, N. 2015 Financial Cryptography and Data Security (FC 2015). Bohme, R. & Okamoto, T. (eds.). Springer-Verlag, p. 272-290 19 p. (Lecture Notes in Computer Science; vol. 8975)

    Publication: Contribution to book/anthologyA3 Contribution to book/other compilations (refereed)

  7. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks

    Huhta, O., Shrestha, P., Udar, S., Juuti, M., Saxena, N. & Asokan, N. 2016 14 p.

    Publication: Conference contributionA4 Article in conference publication (refereed)

  8. Characterizing SEAndroid Policies in the Wild

    Reshetova, E., Bonazzi, F., Nyman, T., Borgaonkar, R. & Asokan, N. 2016 p. 482-489 8 p.

    Publication: Conference contributionA4 Article in conference publication (refereed)

  9. On Improving Tie Strength Estimates by Aggregating Multiple Communication Channels

    Yousefnezhad, N., Nagy, M. & Asokan, N. 2016 p. 530-535 6 p.

    Publication: Conference contributionA4 Article in conference publication (refereed)

  10. Real-Time Client-Side Phishing Prevention Add-on

    Armano, G., Marchal, S. & Asokan, N. 2016 p. 777-778 2 p.

    Publication: Conference contributionA4 Article in conference publication (refereed)

Previous 1 2 3 4 Next