Miika Komu
Miika Komu
Aalto University, Department of Computer Science and Engineering, Data Communications Software Group
Verified email at aalto.fi
TitleCited byYear
Hypervisors vs. lightweight virtualization: a performance comparison
R Morabito, J Kjšllman, M Komu
2015 IEEE International Conference on Cloud Engineering, 386-393, 2015
2362015
Capillary networks-bridging the cellular and iot worlds
O Novo, N Beijar, M Ocak, J Kjšllman, M Komu, T Kauppinen
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 571-578, 2015
512015
Host identity protocol: identifier/locator split for host mobility and multihoming
A Gurtov, M Komu, R Moskowitz
The Internet Protocol Journal 12 (1), 27-32, 2009
462009
Towards a ubiquitous cloud computing infrastructure
J Van der Merwe, KK Ramakrishnan, M Fairchild, A Flavel, J Houle, ...
2010 17th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN), 1-6, 2010
352010
Using the Host Identity Protocol with legacy applications
T Henderson, P Nikander, M Komu
RFC 5338 (Experimental), Sep, 2008
272008
Basic Socket Interface Extensions for the Host Identity Protocol (HIP)
M Komu, T Henderson
RFC 6317, July, 2011
252011
Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators
M Komu, J Melen, H Tschofenig, T Henderson
24*2010
Cure for spam over internet telephony
J Lindqvist, M Komu
2007 4th IEEE Consumer Communications and Networking Conference, 896-900, 2007
232007
Secure networking for virtual machines in the cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
2012 IEEE International Conference on Cluster Computing Workshops, 88-96, 2012
212012
Socket application program interface (API) for multihoming shim
M Komu, M Bagnulo, K Slavov, S Sugimoto
draft-ietf-shim6-multihome-shim-api-03 (work in progress), 930-0804, 2007
182007
Applying a cryptographic namespace to applications
M Komu, S Tarkoma, J Kangasharju, A Gurtov
Proceedings of the 1st ACM workshop on Dynamic interconnection of networks†…, 2005
172005
Application programming interfaces for the host identity protocol
M Komu
Master's thesis, Helsinki University of Technology, 2004
152004
Adoption barriers of network layer protocols: The case of host identity protocol
T Levš, M Komu, A Keršnen, S Luukkainen
Computer networks 57 (10), 2218-2232, 2013
142013
A survey of identifier–locator split addressing architectures
M Komu, M Sethi, N Beijar
Computer Science Review 17, 25-42, 2015
122015
Secure and efficient ipv4/ipv6 handovers using host-based identifier-locator split
S Varjonen, M Komu, A Gurtov
Udruga za komunikacijske i informacijske tehnologije, Fakultet†…, 2010
122010
End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace
T Heer, R Hummen, M Komu, S Gotz, K Wehrle
2009 IEEE International Conference on Communications, 1-6, 2009
122009
An implementation of HIP for Linux
C Candolin, M Komu, M Kousa, J Lundberg
Proc. of the Linux Symposium, 2003
12*2003
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study
A Ranjbar, M Komu, P Salmela, T Aura
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 281-288, 2016
92016
End-Host Authentication for HIP Middleboxes
T Heer, M Komu, K Wehrle
draft-heer-hip-middle-auth-00. txt, 2009
82009
Leap-of-faith security is enough for ip mobility
M Komu, J Lindqvist
2009 6th IEEE Consumer Communications and Networking Conference, 1-5, 2009
82009
The system can't perform the operation now. Try again later.
Articles 1–20