N. Asokan
N. Asokan
Professor of Computer Science, University of Waterloo
Verified email at - Homepage
Cited by
Cited by
Securing ad hoc routing protocols
MG Zapata, N Asokan
Proceedings of the 1st ACM workshop on Wireless security, 1-10, 2002
Optimistic protocols for fair exchange
N Asokan, M Schunter, M Waidner
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
Iot sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Key agreement in ad hoc networks
N Asokan, P Ginzboorg
Computer communications 23 (17), 1627-1637, 2000
Oblivious neural network predictions via minionn transformations
J Liu, M Juuti, Y Lu, N Asokan
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
IEEE Journal on Selected Areas in communications 18 (4), 593-610, 2000
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
Asynchronous protocols for optimistic fair exchange
N Asokan, V Shoup, M Waidner
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
DÏoT: A federated self-learning anomaly detection system for IoT
TD Nguyen, S Marchal, M Miettinen, H Fereidooni, N Asokan, AR Sadeghi
2019 IEEE 39th International conference on distributed computing systems …, 2019
State of the art in electronic payment systems
N Asokan, PA Janson, M Steiner, M Waidner
IEEE Computer 30 (9), 28-35, 1997
Digital rights management in a mobile communications environment
M Kontio, Z Honglang, P Gustafsson, J Durand, N Asokan, JE Ekberg, ...
US Patent App. 10/482,918, 2004
Man-in-the-middle in tunnelled authentication protocols
N Asokan, V Niemi, K Nyberg
Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4 …, 2005
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
A Shaik, R Borgaonkar, N Asokan, V Niemi, JP Seifer
NDSS 2016, 2016
PRADA: protecting against DNN model stealing attacks
M Juuti, S Szyller, S Marchal, N Asokan
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 512-527, 2019
Authentication in a packet data network
H Haverinen, JP Honkanen, A Kuikka, N Asokan, P Flykt, J Ala-Laurila, ...
US Patent 7,107,620, 2006
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
PH Chia, Y Yamamoto, N Asokan
Fairness in electronic commerce
N Asokan
University of Waterloo, 1998
C-FLAT: control-flow attestation for embedded systems software
T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
Mobile Agents: Second International Workshop, MA’98 Stuttgart, Germany …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20