N. Asokan
N. Asokan
Professor of Computer Science, University of Waterloo
Verified email at uwaterloo.ca - Homepage
TitleCited byYear
Securing ad hoc routing protocols
MG Zapata, N Asokan
Proceedings of the 1st ACM workshop on Wireless security, 1-10, 2002
Key agreement in ad hoc networks
N Asokan, P Ginzboorg
Computer communications 23 (17), 1627-1637, 2000
Optimistic protocols for fair exchange
N Asokan, M Schunter, M Waidner
IBM Thomas J. Watson Research Division, 1996
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
IEEE Journal on Selected Areas in communications 18 (4), 593-610, 2000
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
International Conference on the Theory and Applications of Cryptographic …, 1998
Asynchronous protocols for optimistic fair exchange
N Asokan, V Shoup, M Waidner
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
State of the art in electronic payment systems
N Asokan, P Janson, M Steiner, M Waidner
Advances in Computers 53, 425-449, 2000
State of the art in electronic payment systems
N Asokan, PA Janson, M Steiner, M Waidner
IEEE Computer 30 (9), 28-35, 1997
Digital rights management in a mobile communications environment
M Kontio, Z Honglang, P Gustafsson, J Durand, N Asokan, JE Ekberg, ...
US Patent App. 10/482,918, 2004
Man-in-the-middle in tunnelled authentication protocols
N Asokan, V Niemi, K Nyberg
International Workshop on Security Protocols, 28-41, 2003
Authentication in a packet data network
H Haverinen, JP Honkanen, A Kuikka, N Asokan, P Flykt, J Ala-Laurila, ...
US Patent 7,107,620, 2006
Fairness in electronic commerce
N Asokan
University of Waterloo, 1998
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
International Workshop on Mobile Agents, 195-207, 1998
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
PH Chia, Y Yamamoto, N Asokan
Secure Vickrey auctions without threshold trust
H Lipmaa, N Asokan, V Niemi
International Conference on Financial Cryptography, 87-101, 2002
Linking security association to entries in a contact directory of a wireless device
S Moloney, J Teinila, N Asokan, P Eronen
US Patent App. 10/859,433, 2005
Usability analysis of secure pairing methods
E Uzun, K Karvonen, N Asokan
International Conference on Financial Cryptography and Data Security, 307-324, 2007
Administration of wireless local area networks
N Asokan, P Ginzboorg, S Moloney, K Kostiainen
US Patent 20,060,251,256, 2013
Anonymity and untraceability in mobile networks
D Samfat, R Molva, N Asokan
ACM International Conference on Mobile Computing and Networking, 1995
The system can't perform the operation now. Try again later.
Articles 1–20