Securing ad hoc routing protocols MG Zapata, N Asokan Proceedings of the 1st ACM workshop on Wireless security, 1-10, 2002 | 1250 | 2002 |
Iot sentinel: Automated device-type identification for security enforcement in iot M Miettinen, S Marchal, I Hafeez, N Asokan, AR Sadeghi, S Tarkoma 2017 IEEE 37th international conference on distributed computing systems …, 2017 | 828 | 2017 |
Oblivious neural network predictions via minionn transformations J Liu, M Juuti, Y Lu, N Asokan Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 796 | 2017 |
Optimistic protocols for fair exchange N Asokan, M Schunter, M Waidner Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 725 | 1997 |
DÏoT: A federated self-learning anomaly detection system for IoT TD Nguyen, S Marchal, M Miettinen, H Fereidooni, N Asokan, AR Sadeghi 2019 IEEE 39th International conference on distributed computing systems …, 2019 | 716* | 2019 |
Key agreement in ad hoc networks N Asokan, P Ginzboorg Computer communications 23 (17), 1627-1637, 2000 | 669 | 2000 |
Optimistic fair exchange of digital signatures N Asokan, V Shoup, M Waidner International Conference on the Theory and Applications of Cryptographic …, 1998 | 587 | 1998 |
Optimistic fair exchange of digital signatures N Asokan, V Shoup, M Waidner IEEE Journal on Selected Areas in communications 18 (4), 593-610, 2000 | 586 | 2000 |
Asynchronous protocols for optimistic fair exchange N Asokan, V Shoup, M Waidner Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998 | 525 | 1998 |
PRADA: protecting against DNN model stealing attacks M Juuti, S Szyller, S Marchal, N Asokan 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 512-527, 2019 | 481 | 2019 |
State of the art in electronic payment systems N Asokan, PA Janson, M Steiner, M Waidner IEEE Computer 30 (9), 28-35, 1997 | 452 | 1997 |
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems A Shaik, R Borgaonkar, N Asokan, V Niemi, JP Seifer NDSS 2016, 2016 | 384 | 2016 |
Man-in-the-middle in tunnelled authentication protocols N Asokan, V Niemi, K Nyberg International Workshop on Security Protocols, 28-41, 2003 | 361 | 2003 |
Digital rights management in a mobile communications environment M Kontio, Z Honglang, P Gustafsson, J Durand, N Asokan, JE Ekberg, ... US Patent App. 10/482,918, 2004 | 351 | 2004 |
C-FLAT: control-flow attestation for embedded systems software T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 349 | 2016 |
Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals PH Chia, Y Yamamoto, N Asokan | 316 | 2012 |
Authentication in a packet data network H Haverinen, JP Honkanen, A Kuikka, N Asokan, P Flykt, J Ala-Laurila, ... US Patent 7,107,620, 2006 | 310 | 2006 |
Fairness in electronic commerce N Asokan University of Waterloo, 1998 | 306 | 1998 |
All You Need is "Love": Evading Hate Speech Detection T Gröndahl, L Pajola, M Juuti, M Conti, N Asokan Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security …, 2018 | 278 | 2018 |
Seda: Scalable embedded device attestation N Asokan, F Brasser, A Ibrahim, AR Sadeghi, M Schunter, G Tsudik, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 276 | 2015 |