Experiences with Model Inference Assisted Fuzzing. J Viide, A Helin, M Laakso, P Pietikäinen, M Seppänen, K Halunen, ... WOOT 2, 1-2, 2008 | 48 | 2008 |
Smart contracts for a mobility-as-a-service ecosystem A Karinsalo, K Halunen 2018 IEEE International Conference on Software Quality, Reliability and …, 2018 | 45 | 2018 |
Detecting man-in-the-middle attacks on non-mobile systems VA Vallivaara, M Sailio, K Halunen Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 34 | 2014 |
Evaluation of user authentication methods in the gadget-free world K Halunen, J Häikiö, V Vallivaara Pervasive and Mobile Computing 40, 220-241, 2017 | 31 | 2017 |
Evaluating the Efficiency of Blockchains in IoT with Simulations. J Kreku, VA Vallivaara, K Halunen, J Suomalainen, M Ramachandran, ... IoTBDS, 216-223, 2017 | 21 | 2017 |
Review of the use of human senses and capabilities in cryptography K Halunen, OM Latvala Computer Science Review 39, 100340, 2021 | 19 | 2021 |
Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis: (Short Paper) T Schaberreiter, K Kittilä, K Halunen, J Röning, D Khadraoui Critical Information Infrastructure Security: 6th International Workshop …, 2013 | 14 | 2013 |
Implementing post-quantum cryptography for developers J Hekkala, M Muurman, K Halunen, V Vallivaara SN Computer Science 4 (4), 365, 2023 | 13 | 2023 |
Multicollision attacks and generalized iterated hash functions J Kortelainen, K Halunen, T Kortelainen Journal of Mathematical Cryptology 4 (3), 239-270, 2010 | 12 | 2010 |
Software vulnerability vs. critical infrastructure-a case study of antivirus software J Eronen, K Karjalainen, R Puuperä, E Kuusela, K Halunen, M Laakso, ... International Journal on Advances in Security 2 (1), 2009 | 12 | 2009 |
n-auth: Mobile authentication done right R Peeters, J Hermans, P Maene, K Grenman, K Halunen, J Häikiö Proceedings of the 33rd Annual Computer Security Applications Conference, 1-15, 2017 | 11 | 2017 |
Digi-HTA, assessment framework for digital healthcare services: information security and data protection in health technology–initial experiences J Jääskelä, J Haverinen, R Kaksonen, J Reponen, K Halunen, T Tokola, ... Finnish Journal of eHealth and eWelfare 14 (1), 19-30, 2022 | 10 | 2022 |
On the Similarities between Blockchains and Merkle-Damgård Hash Functions K Halunen, V Vallivaara, A Karinsalo 2018 IEEE International Conference on Software Quality, Reliability and …, 2018 | 10 | 2018 |
A generic multimodels-based approach for the analysis of usability and security of authentication mechanisms N Broders, C Martinie, P Palanque, M Winckler, K Halunen Human-Centered Software Engineering: 8th IFIP WG 13.2 International Working …, 2020 | 8 | 2020 |
Secure, usable and privacy-friendly user authentication from keystroke dynamics K Halunen, V Vallivaara Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016 | 8 | 2016 |
Common cybersecurity requirements in IoT standards, best practices, and guidelines R Kaksonen, K Halunen, J Röning Proceedings of the 7th International Conference on Internet of Things, Big …, 2022 | 7 | 2022 |
CryptoVault-A Secure Hardware Wallet for Decentralized Key Management N Lehto, K Halunen, OM Latvala, A Karinsalo, J Salonen 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS …, 2021 | 7 | 2021 |
" Speak, Friend, and Enter"-Secure, Spoken One-Time Password Authentication OM Latvala, C Peng, P Honkamaa, K Halunen 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 7 | 2018 |
Context-aware systems and adaptive user authentication K Halunen, A Evesti Evolving Ambient Intelligence: AmI 2013 Workshops, Dublin, Ireland, December …, 2013 | 7 | 2013 |
Vulnerability dependencies in antivirus software K Askola, R Puuperä, P Pietikäinen, J Eronen, M Laakso, K Halunen, ... 2008 Second International Conference on Emerging Security Information …, 2008 | 7 | 2008 |