关注
Joona Kannisto
标题
引用次数
年份
A non‐repudiable negotiation protocol for security service level agreements
J Kannisto, T Takahashi, J Harju, S Heikkinen, M Helenius, S Matsuo, ...
International Journal of Communication Systems 28 (15), 2067-2081, 2015
42015
Accountable security mechanism based on security service level agreement
T Takahashi, J Kannisto, J Harju, S Heikkinen, M Helenius, S Matsuo, ...
2013 IEEE Symposium on Computers and Communications (ISCC), 000404-000410, 2013
22013
Android Security Software Needs More Privileges
J Kannisto, M Helenius
Proceedings of SQM and INSPIRE 2012, August 21-23, 2012, Tampere, Finland, 49-59, 2012
2012
Cloud software Program: Best Practices for Cloud Computing
J Ahola, A Ashfar, B Gupta, U Hassan, M Hartikainen, M Helenius, ...
Tieto-ja viestintäteollisuuden tutkimus TIVIT Oy, 2010
32010
Delayed Key Exchange for Constrained Smart Devices
J Kannisto, S Heikkinen, K Slavov, J Harju
Ad-hoc Networks and Wireless: ADHOC-NOW 2014 International Workshops, ETSD …, 2015
2015
Digital Identities and Accountable Agreements in Web Applications
J Kannisto, J Harju, T Takahashi
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
2014
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme
T Takahashi, J Kannisto, J Harju, A Kanaoka, Y Takano, S Matsuo
2014 IEEE World Congress on Services, 121-128, 2014
32014
Facilitating the delegation of use for private devices in the era of the internet of wearable things
A Ometov, SV Bezzateev, J Kannisto, J Harju, S Andreev, Y Koucheryavy
IEEE Internet of Things Journal 4 (4), 843-854, 2016
722016
Heuristic Evaluation of Security Product User Experience
J Kannisto, M Helenius
Proceedings of SQM and INSPIRE 2012, August 21-23, 2012, Tampere, Finland, 22-35, 2012
2012
Implementation experiences and design challenges for resilient SDN based secure WAN overlays
M Vajaranta, J Kannisto, J Harju
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 17-23, 2016
82016
IPsec and IKE as functions in SDN controlled network
M Vajaranta, J Kannisto, J Harju
Network and System Security: 11th International Conference, NSS 2017 …, 2017
82017
Location Sharing Patterns of Parents and Their Children
M Helenius, J Kannisto, H Kiljander, V Nore
Internet of Things Finland, 19-21, 2014
2014
Network application function registration
P Salmela, J Kannisto, M Sethi, K Slavov
US Patent 11,252,572, 2022
42022
Observing hidden service directory spying with a private hidden service honeynet
J Nurmi, J Kannisto, M Vajaranta
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 55-59, 2016
22016
Programming model perspective on security and privacy of social cyber-physical systems
J Kannisto, N Mäkitalo, T Aaltonen, T Mikkonen
2016 IEEE International Conference on Mobile Services (MS), 87-94, 2016
72016
Reputation Based Trust Management in a Wiki Environment
J Kannisto
2011
ReputationPlugin Reputation Based Trust Management Plugin for TWiki, Available as open source License GPLv2
J Kannisto, M Helenius, P Thoeny, F Morris, C Currie, S Dowideit, ...
2011
Safe, Secure Executions at the Network Edge
N Mäkitalo, A Ometov, J Kannisto, S Andreev, Y Koucheryavy, T Mikkonen
Safe, secure executions at the network edge: coordinating cloud, edge, and fog computing
N Mäkitalo, A Ometov, J Kannisto, S Andreev, Y Koucheryavy, T Mikkonen
IEEE Software 35 (1), 30-37, 2017
82*2017
SPECIAL ISSUE ON PRIVACY ISSUES IN INTERNET OF THINGS
A Ometov, SV Bezzateev, J Kannisto, J Harju, S Andreev, Y Koucheryavy, ...
系统目前无法执行此操作,请稍后再试。
文章 1–20