N. Asokan
N. Asokan
Professor of Computer Science, University of Waterloo
Verified email at uwaterloo.ca - Homepage
TitleCited byYear
Securing ad hoc routing protocols
MG Zapata, N Asokan
Proceedings of the 1st ACM workshop on Wireless security, 1-10, 2002
11462002
Optimistic protocols for fair exchange
N Asokan, M Schunter, M Waidner
Proceedings of the 4th ACM conference on Computer and communications …, 1997
6241997
Key agreement in ad hoc networks
N Asokan, P Ginzboorg
Computer communications 23 (17), 1627-1637, 2000
6212000
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
IEEE Journal on Selected Areas in communications 18 (4), 593-610, 2000
5142000
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
International Conference on the Theory and Applications of Cryptographic …, 1998
5041998
Asynchronous protocols for optimistic fair exchange
N Asokan, V Shoup, M Waidner
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
4531998
State of the art in electronic payment systems
N Asokan, P Janson, M Steiner, M Waidner
Advances in Computers 53, 425-449, 2000
3702000
State of the art in electronic payment systems
N Asokan, PA Janson, M Steiner, M Waidner
IEEE Computer 30 (9), 28-35, 1997
3701997
Digital rights management in a mobile communications environment
M Kontio, Z Honglang, P Gustafsson, J Durand, N Asokan, JE Ekberg, ...
US Patent App. 10/482,918, 2004
3242004
Man-in-the-middle in tunnelled authentication protocols
N Asokan, V Niemi, K Nyberg
International Workshop on Security Protocols, 28-41, 2003
3202003
Authentication in a packet data network
H Haverinen, JP Honkanen, A Kuikka, N Asokan, P Flykt, J Ala-Laurila, ...
US Patent 7,107,620, 2006
2952006
Fairness in electronic commerce
N Asokan
University of Waterloo, 1998
2621998
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
International Workshop on Mobile Agents, 195-207, 1998
2551998
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
PH Chia, Y Yamamoto, N Asokan
2432012
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
2362006
Secure Vickrey auctions without threshold trust
H Lipmaa, N Asokan, V Niemi
International Conference on Financial Cryptography, 87-101, 2002
1982002
Usability analysis of secure pairing methods
E Uzun, K Karvonen, N Asokan
International Conference on Financial Cryptography and Data Security, 307-324, 2007
1702007
Iot sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
1662017
Linking security association to entries in a contact directory of a wireless device
S Moloney, J Teinila, N Asokan, P Eronen
US Patent App. 10/859,433, 2005
1612005
Untraceability in mobile networks
D Samfat, R Molva, N Asokan
Proceedings of the 1st annual international conference on Mobile computing …, 1995
1491995
The system can't perform the operation now. Try again later.
Articles 1–20