N. Asokan
N. Asokan
Professor of Computer Science, University of Waterloo
Verified email at uwaterloo.ca - Homepage
Title
Cited by
Cited by
Year
Securing ad hoc routing protocols
MG Zapata, N Asokan
Proceedings of the 1st ACM workshop on Wireless security, 1-10, 2002
11692002
Key agreement in ad hoc networks
N Asokan, P Ginzboorg
Computer communications 23 (17), 1627-1637, 2000
6322000
Optimistic protocols for fair exchange
N Asokan, M Schunter, M Waidner
Proceedings of the 4th ACM conference on Computer and communications …, 1997
6291997
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
IEEE Journal on Selected Areas in communications 18 (4), 593-610, 2000
5282000
Optimistic fair exchange of digital signatures
N Asokan, V Shoup, M Waidner
International Conference on the Theory and Applications of Cryptographic …, 1998
5081998
Asynchronous protocols for optimistic fair exchange
N Asokan, V Shoup, M Waidner
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
4561998
State of the art in electronic payment systems
N Asokan, P Janson, M Steiner, M Waidner
Advances in Computers 53, 425-449, 2000
3722000
State of the art in electronic payment systems
N Asokan, PA Janson, M Steiner, M Waidner
IEEE Computer 30 (9), 28-35, 1997
3721997
Digital rights management in a mobile communications environment
M Kontio, Z Honglang, P Gustafsson, J Durand, N Asokan, JE Ekberg, ...
US Patent App. 10/482,918, 2004
3282004
Man-in-the-middle in tunnelled authentication protocols
N Asokan, V Niemi, K Nyberg
International Workshop on Security Protocols, 28-41, 2003
3272003
Authentication in a packet data network
H Haverinen, JP Honkanen, A Kuikka, N Asokan, P Flykt, J Ala-Laurila, ...
US Patent 7,107,620, 2006
2972006
Fairness in electronic commerce
N Asokan
University of Waterloo, 1998
2641998
Protecting the computation results of free-roaming agents
G Karjoth, N Asokan, C Gülcü
International Workshop on Mobile Agents, 195-207, 1998
2541998
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals
PH Chia, Y Yamamoto, N Asokan
2512012
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-313, 2006
2432006
Iot sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
2382017
Oblivious neural network predictions via minionn transformations
J Liu, M Juuti, Y Lu, N Asokan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2082017
Secure Vickrey auctions without threshold trust
H Lipmaa, N Asokan, V Niemi
International Conference on Financial Cryptography, 87-101, 2002
2042002
Usability analysis of secure pairing methods
E Uzun, K Karvonen, N Asokan
International Conference on Financial Cryptography and Data Security, 307-324, 2007
1722007
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
A Shaik, R Borgaonkar, N Asokan, V Niemi, JP Seifer
NDSS 2016, 2016
1712016
The system can't perform the operation now. Try again later.
Articles 1–20