TeSSA [suomeksi] | Internal | Publications | Links | Contact | Jory  

Publications

  • Master's Thesis
  • Licenciate's Thesis
  • Doctoral Thesis
  • Published papers

    2001

    • Kristiina Karvonen, Jarmo Parkkinen: Signs of Trust, to appear in Proceedings of the 9th International Conference on HCI, August 5-10, 2001, New Orleans, LA, USA
      (Download in PDF)
    • Kristiina Karvonen, Lucas Cardholm, Stefan Karlsson: Designing Trust for a Universal Audience: A Multicultural Study on the Formation of Trust in the Internet in the Nordic Countries, to appear in the Proceedings of the First International Conference on Universal Access in HCI(UAHCI'2001), August 5-10, 2001, New Orleans, LA, USA
      (Download in PDF)
    • Kristiina Karvonen, Jarmo Parkkinen: A Short Note on the Social Consequences of Wearables, to appear in Proceedings of the 5th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI2001), July 22-25, 2001, Orlando, Florida, USA
      (Download in PDF)
    • Jarmo Parkkinen, Kristiina Karvonen: Group Awareness in Bluetooth, to appear in Proceedings of the Third International Workshop on Network Appliances (IWNA'2001), February 28-March 2, 2001, Singapore
      (Download in PDF)
    • Pasi Eronen, Pekka Nikander: Decentralized Jini Security, to appear in Proceedings of Network and Distributed System Security Symposium (NDSS 2001), 8-9 February 2001, San Diego, California, USA

    2000

    • Helger Lipmaa, Phillip Rogaway, and David Wagner: Comments to NIST Concerning AES-modes of Operations: CTR-mode Encryption. In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, US, 20 October 2000. Electronic proceedings available from http://www.nist.go/modes.
      Download in (PS.gz, PDF)
    • Kristiina Karvonen: The Beauty of Simplicity, in Proceedings of the ACM Conference on Universal Usability (CUU 2000), November 16-17, 2000, Washington DC, USA
      (Download in PDF)
    • Ahto Buldas, Peeter Laud and Helger Lipmaa: Accountable Certificate Management with Undeniable Attestations, in Sushil Jajodia and Pierangela Samarati, editors, 7th ACM Conference on Computer and Communications Security, pages 9--18, Athens, Greece, 1--4 November 2000. ACM Press. ACM ISBN 1-58113-203-4.
      Download in (PS.gz, PDF)
    • Kristiina Karvonen, Ursula Holmström: Expressing Trust, in Proceedings of NordiCHI 2000 (short papers), The First Nordic Conference on Computer-Human Interaction, 23-25 October 2000, Royal Institute of Technology, Stockholm, Sweden
      (Download in PDF)
    • Tommi Elo:Lessons learned on implementing ECDSA on a Java smart card, Proceedings of NordSec2000, October 12-13, 2000, Reykjavik, Iceland.
      (Download in PDF)
    • Pasi Eronen, Christian Gehrman, Pekka Nikander: Securing ad hoc Jini services, Proceedings of NordSec2000, October 12-13, 2000, Reykjavik, Iceland.
      (Download in PDF)
    • Juho Heikkilä: Do I Know You? User Recognition without Identification , Proceedings of NordSec2000, October 12-13, 2000, Reykjavik, Iceland.
      (Download in PDF)
    • Kristiina Karvonen, Lucas Cardholm, Stefan Karlsson: Cultures of Trust: A Cross-Cultural Study on the Formation of Trust in an Electronic Environment, Proceedings of NordSec2000, October 12-13, 2000, Reykjavik, Iceland.
      (Download in PDF)
    • Markku Laukka: Criteria for Privacy Supporting System, Proceedings of NordSec2000, October 12-13, 2000, Reykjavik, Iceland.
      (Download in PDF)
    • Oskari Pirttikoski, Yki Kortesniemi: Local Key and Certificate Storage in JDK 1.3, Proceedings of NordSec2000, October 12-13, 2000, Reykjavik, Iceland.
      (Download in PDF)
    • Tommi Elo, Pekka Nikander: Decentralized Authorization with ECDSA on a Java Smart Card Proceedings of IFIP CARDIS 2000, September 20-22, 2000, HP Labs, Bristol, UK, Kluver Academic Publishers, September 2000.
      (Download in PS, PDF)
    • Pekka Nikander, Kristiina Karvonen: Users and Trust in Cyberspace, Proceedings of Cambridge Security Protocols Workshop 2000, April 3-5, 2000, Cambridge University.
      (Download in PDF)
    • Yki Kortesniemi, Tero Hasu, Jonna Särs: A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems, Proceedings of Network and Distributed System Security Symposium (NDSS 2000), 2-4 February 2000, San Diego, California.
      (Download in PS, PDF)

    1999

    • Kristiina Karvonen: Enhancing Trust Online, Proceedings of PhDIT'99: Ethics in Information Technology Design. Second International Workshop on Philosophy of Design and Information Technology, 16-17 December, 1999, Saint-Ferriol, Toulouse, France
      (Download in PS, PDF)
    • Sanna Liimatainen: An Object-Oriented ISAKMP Implementation, Proceedings of the fourth Nordic Workshop on Secure IT systems (Nordsec'99), November 1-2, 1999, Kista, Sweden.
      (Download in PS, PDF)
    • Tuomo Lampinen: Using SPKI Certificates for Authorization in CORBA based Distributed Object-Oriented Systems, Proceedings of the fourth Nordic Workshop on Secure IT systems (Nordsec'99), November 1-2, 1999, Kista, Sweden.
      (Download in PS, PDF)
    • Juho Heikkilä, Markku Laukka: SPKI based solution to anonymous payment and transaction authorization, Proceedings of the fourth Nordic Workshop on Secure IT systems (Nordsec'99), November 1-2, 1999, Kista, Sweden.
      (Download in PDF)
    • Kristiina Karvonen: Creating Trust, Proceedings of the fourth Nordic Workshop on Secure IT systems (Nordsec'99), November 1-2, 1999, Kista, Sweden.
      (Download in PS, PDF)
    • Ursula Holmström: User-centered design of security software, Human factors in Telecommunications, 4-5 May, 1999, Copenhagen, Denmark.
      (Download in PS, PDF)
    • Pekka Nikander, Yki Kortesniemi, Jonna Partanen: Preserving Privacy with Certificates in Distributed Delegation, Proceedings of 1999 International workshop on Practice and Theory in Public Key Cryptography, March 1-3, 1999, Kamakura, Japan.
      (Download in PDF)
    • Pekka Nikander, Jonna Partanen: Distributed Policy Management for Java 1.2, Proceedings of Network and Distributed System Security Symposium, February 4-5, 1999, San Diego, California.
      (Download in PDF)

    1998

    • Jonna Partanen, Pekka Nikander: Adding SPKI Certificates to JDK 1.2, Proceedings of the Nordsec'98, the Third Nordic Workshop on Secure IT Systems, November 5th-6th, 1998, Trondheim, Norway.
      (Download in PDF)
    • Pekka Nikander, Lea Viljanen: Storing and Retrieving Internet Certificates, Proceedings of the Nordsec'98, the Third Nordic Workshop on Secure IT Systems, November 5th-6th, 1998, Trondheim, Norway.
      (Download in PDF)
    • Yki Kortesniemi: Implementing Elliptic Curve Cryptosystems in Java 1.2 , Proceedings of the Nordsec'98, the Third Nordic Workshop on Secure IT Systems, November 5th-6th, 1998, Trondheim, Norway.
      (Download in PDF) (Errata)
    • Pekka Nikander, Arto Karila: A Java Beans Component Architecture for Cryptographic Protocols, Proceedings of the 7th Usenix Security Symbosium, January 26-29, 1998, San Antonio, Texas.
      (Download in PS, PDF)
    • Ilari Lehti, Pekka Nikander: Certifying Trust , Proceedings of the Theory and Practic in Public Key Cryptography (PKC-98), February 1998, Yokohama, Japan.
      (Download in PS, PDF)

    Published poster papers

    2000

    Research prototypes

    2000

    1999

    1998

    -TML contact- -TML kotisivu- -Etsi-
    This page is maintained by Laura Lehtola, Email: llehtola@tml.hut.fi (10.1.2001).
    URL: http://www.tml.hut.fi/Research/TeSSA/publications.html