Follow
Miika Komu
Miika Komu
Aalto University, Department of Computer Science and Engineering, Data Communications Software Group
Verified email at aalto.fi
Title
Cited by
Cited by
Year
Hypervisors vs. lightweight virtualization: a performance comparison
R Morabito, J Kjällman, M Komu
2015 IEEE International Conference on cloud engineering, 386-393, 2015
5002015
Capillary networks-bridging the cellular and iot worlds
O Novo, N Beijar, M Ocak, J Kjällman, M Komu, T Kauppinen
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 571-578, 2015
972015
Host identity protocol: identifier/locator split for host mobility and multihoming
A Gurtov, M Komu, R Moskowitz
Internet Protocol J 12 (1), 27-32, 2009
552009
Secure networking for virtual machines in the cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
2012 IEEE international conference on cluster computing workshops, 88-96, 2012
332012
Using the Host Identity Protocol with legacy applications
T Henderson, P Nikander, M Komu
RFC 5338 (Experimental), Sep, 2008
302008
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study
A Ranjbar, M Komu, P Salmela, T Aura
NOMS 2016-2016 IEEE/IFIP network operations and management symposium, 281-288, 2016
292016
Cure for spam over internet telephony
J Lindqvist, M Komu
2007 4th IEEE Consumer Communications and Networking Conference, 896-900, 2007
272007
Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators
M Komu, J Melen, H Tschofenig, T Henderson
26*2010
Basic Socket Interface Extensions for the Host Identity Protocol (HIP)
M Komu, T Henderson
242011
Applying a cryptographic namespace to applications
M Komu, S Tarkoma, J Kangasharju, A Gurtov
Proceedings of the 1st ACM Workshop on Dynamic Interconnection of Networks …, 2005
212005
Energy consumption analysis of edge orchestrated virtualized wireless multimedia sensor networks
T Mekonnen, M Komu, R Morabito, T Kauppinen, E Harjula, T Koskela, ...
IEEE Access 6, 5090-5100, 2017
202017
Socket application program interface (API) for multihoming shim
M Komu, M Bagnulo, K Slavov, S Sugimoto
draft-ietf-shim6-multihome-shim-api-03 (work in progress), 930-0804, 2007
19*2007
A survey of identifier–locator split addressing architectures
M Komu, M Sethi, N Beijar
Computer Science Review 17, 25-42, 2015
182015
Synaptic: Secure and persistent connectivity for containers
A Ranjbar, M Komu, P Salmela, T Aura
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
172017
Apparatus and method for managing client devices
ON Diaz, N Beijar, D D'ambrosio, J Jiménez, K Miika, O Mert, P Salmela
US Patent 10,623,504, 2020
162020
Application programming interfaces for the host identity protocol
M Komu
162004
Adoption barriers of network layer protocols: The case of host identity protocol
T Levä, M Komu, A Keränen, S Luukkainen
Computer Networks 57 (10), 2218-2232, 2013
142013
Secure and efficient IPv4/IPv6 handovers using host-based identifier-locator split
S Varjonen, M Komu, A Gurtov
Journal of Communications Software and Systems 6 (1), 1-9, 2010
142010
End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace
T Heer, R Hummen, M Komu, S Gotz, K Wehrle
2009 IEEE International Conference on Communications, 1-6, 2009
132009
An implementation of HIP for Linux
C Candolin, M Komu, M Kousa, J Lundberg
Proc. of the Linux Symposium, 2003
13*2003
The system can't perform the operation now. Try again later.
Articles 1–20