Safe, secure executions at the network edge: coordinating cloud, edge, and fog computing N Mäkitalo, A Ometov, J Kannisto, S Andreev, Y Koucheryavy, T Mikkonen IEEE Software 35 (1), 30-37, 2017 | 83* | 2017 |
Facilitating the delegation of use for private devices in the era of the internet of wearable things A Ometov, SV Bezzateev, J Kannisto, J Harju, S Andreev, Y Koucheryavy IEEE Internet of Things Journal 4 (4), 843-854, 2016 | 79 | 2016 |
Tailored security: Building nonrepudiable security service-level agreements T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ... IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013 | 18 | 2013 |
IPsec and IKE as functions in SDN controlled network M Vajaranta, J Kannisto, J Harju Network and System Security: 11th International Conference, NSS 2017 …, 2017 | 8 | 2017 |
Implementation experiences and design challenges for resilient SDN based secure WAN overlays M Vajaranta, J Kannisto, J Harju 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 17-23, 2016 | 8 | 2016 |
Programming model perspective on security and privacy of social cyber-physical systems J Kannisto, N Mäkitalo, T Aaltonen, T Mikkonen 2016 IEEE International Conference on Mobile Services (MS), 87-94, 2016 | 7 | 2016 |
Network application function registration P Salmela, J Kannisto, M Sethi, K Slavov US Patent 11,252,572, 2022 | 4 | 2022 |
The time will tell on you: Exploring information leaks in ssh public key authentication J Kannisto, J Harju Network and System Security: 11th International Conference, NSS 2017 …, 2017 | 4 | 2017 |
A non‐repudiable negotiation protocol for security service level agreements J Kannisto, T Takahashi, J Harju, S Heikkinen, M Helenius, S Matsuo, ... International Journal of Communication Systems 28 (15), 2067-2081, 2015 | 4 | 2015 |
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme T Takahashi, J Kannisto, J Harju, A Kanaoka, Y Takano, S Matsuo 2014 IEEE World Congress on Services, 121-128, 2014 | 3 | 2014 |
Cloud software Program: Best Practices for Cloud Computing J Ahola, A Ashfar, B Gupta, U Hassan, M Hartikainen, M Helenius, ... Tieto-ja viestintäteollisuuden tutkimus TIVIT Oy, 2010 | 3 | 2010 |
Observing hidden service directory spying with a private hidden service honeynet J Nurmi, J Kannisto, M Vajaranta 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 55-59, 2016 | 2 | 2016 |
Accountable security mechanism based on security service level agreement T Takahashi, J Kannisto, J Harju, S Heikkinen, M Helenius, S Matsuo, ... 2013 IEEE Symposium on Computers and Communications (ISCC), 000404-000410, 2013 | 2 | 2013 |
Delayed Key Exchange for Constrained Smart Devices J Kannisto, S Heikkinen, K Slavov, J Harju Ad-hoc Networks and Wireless: ADHOC-NOW 2014 International Workshops, ETSD …, 2015 | | 2015 |
Location Sharing Patterns of Parents and Their Children M Helenius, J Kannisto, H Kiljander, V Nore Internet of Things Finland, 19-21, 2014 | | 2014 |
Digital Identities and Accountable Agreements in Web Applications J Kannisto, J Harju, T Takahashi Proceedings of the International Conference on Security and Management (SAM), 1, 2014 | | 2014 |
Android Security Software Needs More Privileges J Kannisto, M Helenius Proceedings of SQM and INSPIRE 2012, August 21-23, 2012, Tampere, Finland, 49-59, 2012 | | 2012 |
Heuristic Evaluation of Security Product User Experience J Kannisto, M Helenius Proceedings of SQM and INSPIRE 2012, August 21-23, 2012, Tampere, Finland, 22-35, 2012 | | 2012 |
ReputationPlugin Reputation Based Trust Management Plugin for TWiki, Available as open source License GPLv2 J Kannisto, M Helenius, P Thoeny, F Morris, C Currie, S Dowideit, ... | | 2011 |
Reputation Based Trust Management in a Wiki Environment J Kannisto | | 2011 |