Man-in-the-middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures KMJ Haataja, K Hypponen 2008 3rd International Symposium on Communications, Control and Signal …, 2008 | 108 | 2008 |
An open, PKI-based mobile payment system M Hassinen, K Hyppönen, K Haataja International Conference on Emerging trends in information and communication …, 2006 | 108 | 2006 |
Utilizing national public-key infrastructure in mobile payment systems M Hassinen, K Hyppönen, E Trichina Electronic Commerce Research and Applications 7 (2), 214-231, 2008 | 86 | 2008 |
“Nino” man-in-the-middle attack on bluetooth secure simple pairing K Hypponen, KMJ Haataja 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-5, 2007 | 77 | 2007 |
Bluetooth security attacks: comparative analysis, attacks, and countermeasures K Haataja, K Hyppönen, S Pasanen, P Toivanen Springer Science & Business Media, 2013 | 41 | 2013 |
Sosiaalihuollon valtakunnallisten tietojärjestelmäpalvelujen ja määrämuotoisen kirjaamisen toimeenpanohanke (Kansa-hanke): Hankesuunnitelma vuosille 2016-2020 M Rötsä, H Berglind, M Huovila, K Hyppönen, T Peksiev, J Mykkänen THL, 2016 | 36 | 2016 |
Strong mobile authentication M Hassinen, K Hypponen 2005 2nd International Symposium on Wireless Communication Systems, 96-100, 2005 | 34 | 2005 |
Sosiaali- ja terveydenhuollon asiakas-ja potilastietojen kansallinen kokonaisarkkitehtuuri M Pentikäinen, A Kärkkäinen, J Mykkänen, J Penttinen, K Hyppönen, ... https://yhteistyotilat.fi/wiki08/display/THLAPKKJULK, 2018 | 19* | 2018 |
SIM-enabled open mobile payment system based on nation-wide PKI N Pohlmann, H Reimer, W Schneider, E Trichina, K Hyppönen, ... ISSE/SECURE 2007 Securing Electronic Business Processes: Highlights of the …, 2007 | 14 | 2007 |
Use of cryptographic codes for bytecode verification in smartcard environment K Hyppönen Mémoire de master, Université de Kuopio, 2003 | 13 | 2003 |
National interoperability approach for social services information management in Finland J Mykkänen, K Hyppönen, P Kortelainen, A Lehmuskoski, V Hotti Interoperability in Digital Public Services and Administration: Bridging E …, 2011 | 11 | 2011 |
An open mobile identity tool: An architecture for mobile identity management K Hyppönen European Public Key Infrastructure Workshop, 207-222, 2008 | 11 | 2008 |
Overview of bluetooth security K Haataja, K Hyppönen, S Pasanen, P Toivanen, K Haataja, K Hyppönen, ... Bluetooth Security Attacks: Comparative Analysis, Attacks, and …, 2013 | 8 | 2013 |
Ten years of bluetooth security attacks: Lessons learned K Haataja, K Hypponen, P Toivanen Computer Science I Like 45, 2011 | 7 | 2011 |
Combining biometric authentication with privacy-enhancing technologies K Hyppönen, M Hassinen, E Trichina International Conference on Trusted Computing, 155-165, 2008 | 7 | 2008 |
XHTML with RDFa as a semantic document format for CCTS modelled documents and its application for social services K Hyppönen, M Alonen, S Korhonen, V Hotti The Semantic Web: ESWC 2011 Workshops: ESWC 2011 Workshops, Heraklion …, 2012 | 6 | 2012 |
Computer science research articles: the locations of different section types, and a proposal for standardization in the structure K Hyppönen, V Paganuzzi Scientometrics 84 (1), 199-220, 2010 | 5 | 2010 |
nino” man-in-the-middle attack on bluetooth secure simple pairing. In 2007 3rd IEEE K Hypponen, KMJ Haataja IFIP International Conference in Central Asia on Internet, 1-5, 2007 | 5 | 2007 |
Trading-off type-inference memory complexity against communication K Hyppönen, D Naccache, E Trichina, A Tchoulkine Information and Communications Security: 5th International Conference, ICICS …, 2003 | 5 | 2003 |
Potilastiedon suostumustenhallinta ja yhteisen potilastietorekisterin liittyminen Kantaan-Versio 2014 R Vuokko, J Suhonen, K Hyppönen, J Porrasmaa THL, 2014 | 4 | 2014 |