UMTS networks: architecture, mobility and services H Kaaranen, A Ahtiainen, L Laitinen, S Naghian, V Niemi John Wiley & Sons, 2005 | 692 | 2005 |
Practical attacks against privacy and availability in 4G/LTE mobile communication systems A Shaik arXiv preprint arXiv:1510.07563, 2015 | 411 | 2015 |
Man-in-the-middle in tunnelled authentication protocols N Asokan, V Niemi, K Nyberg International Workshop on Security Protocols, 28-41, 2003 | 347 | 2003 |
Message authentication J Vialen, V Niemi US Patent App. 10/476,988, 2005 | 334 | 2005 |
Secure Vickrey auctions without threshold trust H Lipmaa, N Asokan, V Niemi Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003 | 238 | 2003 |
LTE security D Forsberg, G Horn, WD Moeller, V Niemi John Wiley & Sons, 2012 | 181 | 2012 |
UMTS security V Niemi, K Nyberg John Wiley & Sons, 2006 | 142 | 2006 |
Method for sharing the authorization to use specific resources S Sovio, N Asokan, K Nyberg, V Niemi US Patent 7,343,014, 2008 | 140 | 2008 |
System for ensuring encrypted communication after handover J Vialèn, V Niemi US Patent 7,403,621, 2008 | 127 | 2008 |
UMTS security K Boman, G Horn, P Howard, V Niemi Electronics & Communication Engineering Journal 14 (5), 191-204, 2002 | 126 | 2002 |
Integrity check in a communication system J Vialen, V Niemi US Patent 7,009,940, 2006 | 109 | 2006 |
How to prevent buying of votes in computer elections V Niemi, A Renvall Advances in Cryptology—ASIACRYPT'94: 4th International Conferences on the …, 1995 | 108 | 1995 |
Secure multiparty computations without computers V Niemi, A Renvall Theoretical Computer Science 191 (1-2), 173-183, 1998 | 100 | 1998 |
Two schemes of privacy-preserving trust evaluation Z Yan, W Ding, V Niemi, AV Vasilakos Future Generation Computer Systems 62, 175-189, 2016 | 82 | 2016 |
Frame synchronization mechanism F Longoni, J Vialén, V Niemi, J Ranta US Patent 7,085,294, 2006 | 75 | 2006 |
Mobility related control signalling authentication in mobile communications system DLA Forsberg, V Niemi US Patent 8,145,195, 2012 | 68 | 2012 |
UAKA-D2D: Universal authentication and key agreement protocol in D2D communications M Wang, Z Yan, V Niemi Mobile networks and Applications 22, 510-525, 2017 | 67 | 2017 |
Ciphering as a part of the multicast concept S Sarkkinen, K Kettunen, N Karhuluoma, A Vainio, V Niemi, J Kall US Patent 8,549,287, 2013 | 67 | 2013 |
Method for protecting electronic device, and electronic device A Kiiveri, N Asokan, V Niemi US Patent 7,630,495, 2009 | 55 | 2009 |
Method of checking amount of transmitted data J Vialén, V Niemi US Patent 7,366,496, 2008 | 52 | 2008 |