Miika Komu
Miika Komu
Ericsson research
No verified email - Homepage
Cited by
Cited by
Hypervisors vs. lightweight virtualization: a performance comparison
R Morabito, J Kjšllman, M Komu
2015 IEEE International Conference on cloud engineering, 386-393, 2015
Capillary networks-bridging the cellular and IoT worlds
O Novo, N Beijar, M Ocak, J Kjšllman, M Komu, T Kauppinen
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 571-578, 2015
Host Identity Protocol (HIP): Identifier/locator split for host mobility and multihoming
A Gurtov, M Komu, R Moskowitz
Internet Protocol Journal 12 (1), 27-32, 2009
Secure networking for virtual machines in the cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
2012 IEEE international conference on cluster computing workshops, 88-96, 2012
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study
A Ranjbar, M Komu, P Salmela, T Aura
NOMS 2016-2016 IEEE/IFIP network operations and management symposium, 281-288, 2016
Using the Host Identity Protocol with legacy applications
T Henderson, P Nikander, M Komu
RFC 5338 (Experimental), Sep, 2008
Cure for spam over internet telephony
J Lindqvist, M Komu
2007 4th IEEE Consumer Communications and Networking Conference, 896-900, 2007
Basic Socket Interface Extensions for the Host Identity Protocol (HIP)
M Komu, T Henderson
Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators
M Komu, J Melen, H Tschofenig, T Henderson
Energy consumption analysis of edge orchestrated virtualized wireless multimedia sensor networks
T Mekonnen, M Komu, R Morabito, T Kauppinen, E Harjula, T Koskela, ...
IEEE Access 6, 5090-5100, 2017
Apparatus and method for managing client devices
ON Diaz, N Beijar, D D'ambrosio, J Jimťnez, K Miika, O Mert, P Salmela
US Patent 10,623,504, 2020
Socket application program interface (API) for multihoming shim
M Komu, M Bagnulo, K Slavov, S Sugimoto
draft-ietf-shim6-multihome-shim-api-03 (work in progress), 930-0804, 2007
Multi-cloud connectivity for kubernetes in 5g networks
L Osmani, T Kauppinen, M Komu, S Tarkoma
IEEE Communications Magazine 59 (10), 42-47, 2021
Applying a cryptographic namespace to applications
M Komu, S Tarkoma, J Kangasharju, A Gurtov
Proceedings of the 1st ACM Workshop on Dynamic Interconnection of Networks†…, 2005
A survey of identifier–locator split addressing architectures
M Komu, M Sethi, N Beijar
Computer Science Review 17, 25-42, 2015
Synaptic: Secure and persistent connectivity for containers
A Ranjbar, M Komu, P Salmela, T Aura
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid†…, 2017
Application programming interfaces for the host identity protocol
M Komu
Adoption barriers of network layer protocols: The case of host identity protocol
T Levš, M Komu, A Keršnen, S Luukkainen
Computer networks 57 (10), 2218-2232, 2013
Secure and efficient IPv4/IPv6 handovers using host-based identifier-locator split
S Varjonen, M Komu, A Gurtov
Journal of Communications Software and Systems 6 (1), 1-9, 2010
End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace
T Heer, R Hummen, M Komu, S Gotz, K Wehrle
2009 IEEE International Conference on Communications, 1-6, 2009
The system can't perform the operation now. Try again later.
Articles 1–20