Asokan
Professor, Ohjelmistojärjestelmät ja -teknologia at Aalto University School of Business

Biography
Aalto University School of Business
Peer-reviewed scientific articles
Journal article-refereed, Original researchOff-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
Marchal, S.; Armano, G.; Gröndahl, T.; Saari, K.; Singh, Nidhi; Asokan, N.2017 in IEEE TRANSACTIONS ON COMPUTERS (IEEE Computer Society)ISSN: 0018-9340ABAKA A novel attribute-based k-anonymous collaborative solution for LBSs
Dargahi, Tooska; Ambrosin, Moreno; Conti, Mauro; Asokan, N.2016 in COMPUTER COMMUNICATIONS (Elsevier)ISSN: 0140-3664Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability
Truong, Hien Thi Thu; Gao, Xiang; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri2015 in PERVASIVE AND MOBILE COMPUTING (Elsevier)ISSN: 1574-1192Mobile Trusted Computing
Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian2014 in PROCEEDINGS OF THE IEEE (Institute of Electrical and Electronics Engineers Inc.)ISSN: 0018-9219The Untapped Potential of Trusted Execution Environments on Mobile Devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.2014 in IEEE SECURITY AND PRIVACY (Institute of Electrical and Electronics Engineers Inc.)ISSN: 1540-7993Controlling Resource Hogs in Mobile Delay-tolerant Networks
Solis, John; Asokan, Nadarajah; Kostiainen, Kari; Ginzboorg, Philip; Ott, Jörg2010 in COMPUTER COMMUNICATIONS (Elsevier)ISSN: 0140-3664Standards for security associations in personal networks: a comparative analysis
Suomalainen, Jani; Valkonen, Jukka; Asokan, N.2009 in INTERNATIONAL JOURNAL OF SECURITY AND NETWORKS (Inderscience Enterprises Ltd)
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application
Marchal, S.; Armano, G.; Gröndahl, T.; Saari, K.; Singh, Nidhi; Asokan, N.
2017 in IEEE TRANSACTIONS ON COMPUTERS (IEEE Computer Society)ISSN: 0018-9340
ABAKA A novel attribute-based k-anonymous collaborative solution for LBSs
Dargahi, Tooska; Ambrosin, Moreno; Conti, Mauro; Asokan, N.
2016 in COMPUTER COMMUNICATIONS (Elsevier)ISSN: 0140-3664
Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability
Truong, Hien Thi Thu; Gao, Xiang; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri
2015 in PERVASIVE AND MOBILE COMPUTING (Elsevier)ISSN: 1574-1192
Mobile Trusted Computing
Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
2014 in PROCEEDINGS OF THE IEEE (Institute of Electrical and Electronics Engineers Inc.)ISSN: 0018-9219
The Untapped Potential of Trusted Execution Environments on Mobile Devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.
2014 in IEEE SECURITY AND PRIVACY (Institute of Electrical and Electronics Engineers Inc.)ISSN: 1540-7993
Controlling Resource Hogs in Mobile Delay-tolerant Networks
Solis, John; Asokan, Nadarajah; Kostiainen, Kari; Ginzboorg, Philip; Ott, Jörg
2010 in COMPUTER COMMUNICATIONS (Elsevier)ISSN: 0140-3664
Standards for security associations in personal networks: a comparative analysis
Suomalainen, Jani; Valkonen, Jukka; Asokan, N.
2009 in INTERNATIONAL JOURNAL OF SECURITY AND NETWORKS (Inderscience Enterprises Ltd)Book section, Chapters in research booksSecurity Associations for Wireless Devices
Asokan, N.; Nyberg, Kaisa2009
Security Associations for Wireless Devices
Asokan, N.; Nyberg, Kaisa
2009 Conference proceedingsLO-FAT Low-Overhead Control Flow ATtestation in Hardware
Dessouky, Ghada; Zeitouni, Shaza; Nyman, Thomas; Paverd, Andrew; Davi, Lucas; Koeberl, Patrick; Asokan, N.; Sadeghi, Ahmad-Reza2017 ISBN: 9781450349277STASH: Securing transparent authentication schemes using prover-side proximity verification
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Asokan, N; Martinovic, Ivan2017 ISBN: 978-1-5090-1732-4Implementing prover-side proximity verification for strengthening transparent authentication
Juuti, Mika; Vaas, Christian; Liljestrand, Hans; Sluganovic, Ivo; Asokan, N; Martinovic, Ivan2017 ISBN: 978-1-5090-1732-4IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, M.; Marchal, S.; Hafeez, I.; Frassetto, T.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers
Nyman, Thomas; Ekberg, Jan-Erik; Davi, Lucas; Asokan, N2017 in Lecture Notes in Computer Science (Springer International Publishing)ISBN: 978-3-319-66331-9ISSN: 0302-9743The circle game Scalable private membership test using trusted hardware
Tamrakar, Sandeep; Liu, Jian; Paverd, Andrew; Ekberg, Jan-Erik; Pinkas, Benny; Asokan, N.2017 ISBN: 9781450349444Profiling Users by Modeling Web Transactions
Tomsu, Radek; Marchal, S.; Asokan, N.2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5ISSN: 1063-6927C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene2016 ISBN: 978-1-4503-4139-4Invited - Things, trouble, trust On building trust in IoT systems
Abera, Tigist; Asokan, N.; Davi, Lucas; Koushanfar, Farinaz; Paverd, Andrew; Sadeghi, Ahmad Reza; Tsudik, Gene2016 in Proceedings : ACM IEEE Design Automation Conference (Institute of Electrical and Electronics Engineers Inc.)ISBN: 978-1-4673-8729-3 ISSN: 0738-100XReal-Time Client-Side Phishing Prevention Add-On
Armano, Giovanni; Marchal, Samuel; Asokan, N2016 ISBN: 9781509014828Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks
Huhta, Otto; Shrestha, Prakash; Udar, Swapnil; Juuti, Mika; Saxena, Nitesh; Asokan, N2016 ISBN: 1-891562-41-XProtecting Password Databases Using Trusted Hardware
Krawiecka, Klaudia; Paverd, Andrew; Asokan, N.2016 ISBN: 978-1-4503-4670-2Exploring the Use of Intel SGX for Secure Many-Party Applications
Küçük, Kubilay Ahmet; Paverd, Andrew; Martin, Andrew; Asokan, N.; Simpson, Andrew; Ankele, Robin2016 ISBN: 978-1-4503-4670-2Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets
Marchal, Samuel; Saari, Kalle; Singh, Nidhi; Asokan, N2016 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5090-1483-5 ISSN: 1063-6927Poster Friend or foe? Context authentication for trust domain separation in IoT environments
Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad Reza2016 ISBN: 9781450342704Characterizing SEAndroid policies in the wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishankar; Asokan, N.2016 ISBN: 9789897581670On improving tie strength estimates by aggregating multiple communication channels
Yousefnezhad, Narges; Nagy, Marcin; Asokan, N.2016 ISBN: 9783901882838Checksum gestures: continuous gestures as an out-of-band channel for secure pairing
Ahmed, Imtiaj; Ye, Yina; Bhattacharya, Sourav; Asokan, N.; Jacucci, Giulio; Nurmi, Petteri; Tarkoma, Sasu2015 ISBN: 978-1-4503-3574-4SEDA Scalable embedded device attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian2015 ISBN: 978-1-4503-3832-5LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling
Bhattacharya, Sourav; Huhta, Otto; Asokan, N.2015 ISBN: 978-3-319-22845-7Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, N.2015 ISBN: 978-3-662-47853-0Secure Deduplication of Encrypted Data without Additional Independent Servers
Liu, Jian; Asokan, N.; Pinkas, Benny2015 ISBN: 978-1-4503-3832-5Open-TEE - An Open Virtual Trusted Execution Environment
McGillion, Brian; Dettenborn, Tanel; Nyman, Thomas; Asokan, N.2015 ISBN: 978-1-4673-7952-6ISSN: 2324-9013I Know Where You are: Proofs of Presence Resilient to Malicious Provers
Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha2015 ISBN: 978-1-4503-3245-3How Far Removed Are You?Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh; De Cristofaro, Emiliano; Asokan, N; Ott, Jörg; Sadeghi, Ahmad-Reza2015 ISBN: 978-1-4503-3623-9On Making Emerging Trusted Execution Environments Accessible to Developers
Nyman, Thomas; McGillion, Brian; Asokan, N.2015 ISBN: 978-3-319-22845-7On mobile malware infections
Asokan, N.2014 ISBN: 978-1-4503-2972-9Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
Miettinen, Markus; Asokan, N.; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Sobhani, Majid2014 ISSN: 1543-7221ConXsense Automated Context Classification for Context-Aware Access Control
Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N.2014 ISBN: 978-1-4503-2800-5Citizen Electronic Identities using TPM 2.0
Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.2014 ISBN: 978-1-4503-3149-4Security of OS-Level Virtualization Technologies
Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.2014 ISBN: 978-3-319-11598-6ISSN: 0302-9743Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing
Shrestha, Babins; Saxena, Nitesh; Truong, Hien Thi Thu; Asokan, N.2014 Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
Truong, Hien Thi Thu; Xiang, Gao; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri2014 in International Conference on Pervasive Computing and Communications (ASSOCIATION FOR COMPUTING MACHINERY)ISBN: 978-1-4799-3445-4ISSN: 2474-2503The company you keep: mobile malware infection rates and inexpensive risk indicators
Truong, Hien Thi Thu; Lagerspetz, Eemil; Nurmi, Petteri; Oliner, Adam; Tarkoma, Sasu; Asokan, N.; Bhattacharya, Sourav2014 ISBN: 978-1-4503-2744-2CrowdShare: Secure Mobile Resource Sharing
Asokan, N; Dmitrienko, Alexandra; Nagy, Marcin; Reshetova, Elena; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stelle, Stanislaus2013 PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts
Nagy, Marcin; Asokan, N.; Ott, Jörg2013 in Lecture Notes in Computer Science (ASSOCIATION FOR COMPUTING MACHINERY)ISBN: 978-3-642-41488-6ISSN: 0302-9743Do I Know You? Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Nagy, Marcin; De Cristofaro, Emiliano; Dmitrienko, Alexandra; Asokan, N; Sadeghi, Ahmad-Reza2013 Best-effort authentication for opportunistic networks
Solis, J.; Ginzboorg, P.; Asokan, N.; Ott, J.2011 ISBN: 978-1-4673-0010-0Identity verification schemes for public transport ticketing with NFC phones
Tamrakar, Sandeep; Ekberg, Jan-Erik; Asokan, N.2011 ISBN: 978-1-4503-1001-7Can Hand-held Computers Still Be Better Smart Cards?
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka; Asokan, N.; Aura, Tuomas2010 Security Associations in Personal Networks: A Comparative Analysis
Suomalainen, Jani; Valkonen, Jukka; Asokan, N.2007 Usability Analysis of Secure Pairing Method
Uzun, Ersin; Karvonen, Kristiina; Asokan, N.2007 ISBN: 978-3-540-77365-8ISSN: 0302-9743Ad-Hoc Security Associations for Groups
Valkonen, Jukka; Asokan, N.; Nyberg, Kaisa2006 Man-in-the-Middle in Tunnelled Authentication Protocols
ASokan, N.; Niemi, Valtteri; Nyberg, Kaisa2005 ISBN: 3-540-28389-7Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri2003
LO-FAT Low-Overhead Control Flow ATtestation in Hardware
Dessouky, Ghada; Zeitouni, Shaza; Nyman, Thomas; Paverd, Andrew; Davi, Lucas; Koeberl, Patrick; Asokan, N.; Sadeghi, Ahmad-Reza
2017 ISBN: 9781450349277
STASH: Securing transparent authentication schemes using prover-side proximity verification
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Asokan, N; Martinovic, Ivan
2017 ISBN: 978-1-5090-1732-4
Implementing prover-side proximity verification for strengthening transparent authentication
Juuti, Mika; Vaas, Christian; Liljestrand, Hans; Sluganovic, Ivo; Asokan, N; Martinovic, Ivan
2017 ISBN: 978-1-5090-1732-4
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.
2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5
ISSN: 1063-6927
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
Miettinen, M.; Marchal, S.; Hafeez, I.; Frassetto, T.; Asokan, N.; Sadeghi, Ahmad-Reza; Tarkoma, S.
2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5
ISSN: 1063-6927
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers
Nyman, Thomas; Ekberg, Jan-Erik; Davi, Lucas; Asokan, N
2017 in Lecture Notes in Computer Science (Springer International Publishing)ISBN: 978-3-319-66331-9
ISSN: 0302-9743
The circle game Scalable private membership test using trusted hardware
Tamrakar, Sandeep; Liu, Jian; Paverd, Andrew; Ekberg, Jan-Erik; Pinkas, Benny; Asokan, N.
2017 ISBN: 9781450349444
Profiling Users by Modeling Web Transactions
Tomsu, Radek; Marchal, S.; Asokan, N.
2017 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5386-1791-5
ISSN: 1063-6927
C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene
2016 ISBN: 978-1-4503-4139-4
Invited - Things, trouble, trust On building trust in IoT systems
Abera, Tigist; Asokan, N.; Davi, Lucas; Koushanfar, Farinaz; Paverd, Andrew; Sadeghi, Ahmad Reza; Tsudik, Gene
2016 in Proceedings : ACM IEEE Design Automation Conference (Institute of Electrical and Electronics Engineers Inc.)ISBN: 978-1-4673-8729-3
ISSN: 0738-100X
Real-Time Client-Side Phishing Prevention Add-On
Armano, Giovanni; Marchal, Samuel; Asokan, N
2016 ISBN: 9781509014828
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks
Huhta, Otto; Shrestha, Prakash; Udar, Swapnil; Juuti, Mika; Saxena, Nitesh; Asokan, N
2016 ISBN: 1-891562-41-X
Protecting Password Databases Using Trusted Hardware
Krawiecka, Klaudia; Paverd, Andrew; Asokan, N.
2016 ISBN: 978-1-4503-4670-2
Exploring the Use of Intel SGX for Secure Many-Party Applications
Küçük, Kubilay Ahmet; Paverd, Andrew; Martin, Andrew; Asokan, N.; Simpson, Andrew; Ankele, Robin
2016 ISBN: 978-1-4503-4670-2
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets
Marchal, Samuel; Saari, Kalle; Singh, Nidhi; Asokan, N
2016 in International Conference on Distributed Computing Systems. Proceedings (IEEE)ISBN: 978-1-5090-1483-5
ISSN: 1063-6927
Poster Friend or foe? Context authentication for trust domain separation in IoT environments
Miettinen, Markus; Huang, Jialin; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad Reza
2016 ISBN: 9781450342704
Characterizing SEAndroid policies in the wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishankar; Asokan, N.
2016 ISBN: 9789897581670
On improving tie strength estimates by aggregating multiple communication channels
Yousefnezhad, Narges; Nagy, Marcin; Asokan, N.
2016 ISBN: 9783901882838
Checksum gestures: continuous gestures as an out-of-band channel for secure pairing
Ahmed, Imtiaj; Ye, Yina; Bhattacharya, Sourav; Asokan, N.; Jacucci, Giulio; Nurmi, Petteri; Tarkoma, Sasu
2015 ISBN: 978-1-4503-3574-4
SEDA Scalable embedded device attestation
Asokan, N.; Brasser, Ferdinand; Ibrahim, Ahmad; Sadeghi, Ahmad Reza; Schunter, Matthias; Tsudik, Gene; Wachsmann, Christian
2015 ISBN: 978-1-4503-3832-5
LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive Modeling
Bhattacharya, Sourav; Huhta, Otto; Asokan, N.
2015 ISBN: 978-3-319-22845-7
Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, N.
2015 ISBN: 978-3-662-47853-0
Secure Deduplication of Encrypted Data without Additional Independent Servers
Liu, Jian; Asokan, N.; Pinkas, Benny
2015 ISBN: 978-1-4503-3832-5
Open-TEE - An Open Virtual Trusted Execution Environment
McGillion, Brian; Dettenborn, Tanel; Nyman, Thomas; Asokan, N.
2015 ISBN: 978-1-4673-7952-6
ISSN: 2324-9013
I Know Where You are: Proofs of Presence Resilient to Malicious Provers
Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha
2015 ISBN: 978-1-4503-3245-3
How Far Removed Are You?Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Nagy, Marcin; Bui, Thanh; De Cristofaro, Emiliano; Asokan, N; Ott, Jörg; Sadeghi, Ahmad-Reza
2015 ISBN: 978-1-4503-3623-9
On Making Emerging Trusted Execution Environments Accessible to Developers
Nyman, Thomas; McGillion, Brian; Asokan, N.
2015 ISBN: 978-3-319-22845-7
On mobile malware infections
Asokan, N.
2014 ISBN: 978-1-4503-2972-9
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
Miettinen, Markus; Asokan, N.; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Sobhani, Majid
2014 ISSN: 1543-7221
ConXsense Automated Context Classification for Context-Aware Access Control
Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N.
2014 ISBN: 978-1-4503-2800-5
Citizen Electronic Identities using TPM 2.0
Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.
2014 ISBN: 978-1-4503-3149-4
Security of OS-Level Virtualization Technologies
Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.
2014 ISBN: 978-3-319-11598-6
ISSN: 0302-9743
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing
Shrestha, Babins; Saxena, Nitesh; Truong, Hien Thi Thu; Asokan, N.
2014 Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
Truong, Hien Thi Thu; Xiang, Gao; Shrestha, Babins; Saxena, Nitesh; Asokan, N.; Nurmi, Petteri
2014 in International Conference on Pervasive Computing and Communications (ASSOCIATION FOR COMPUTING MACHINERY)ISBN: 978-1-4799-3445-4
ISSN: 2474-2503
The company you keep: mobile malware infection rates and inexpensive risk indicators
Truong, Hien Thi Thu; Lagerspetz, Eemil; Nurmi, Petteri; Oliner, Adam; Tarkoma, Sasu; Asokan, N.; Bhattacharya, Sourav
2014 ISBN: 978-1-4503-2744-2
CrowdShare: Secure Mobile Resource Sharing
Asokan, N; Dmitrienko, Alexandra; Nagy, Marcin; Reshetova, Elena; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stelle, Stanislaus
2013 PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts
Nagy, Marcin; Asokan, N.; Ott, Jörg
2013 in Lecture Notes in Computer Science (ASSOCIATION FOR COMPUTING MACHINERY)ISBN: 978-3-642-41488-6
ISSN: 0302-9743
Do I Know You? Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Nagy, Marcin; De Cristofaro, Emiliano; Dmitrienko, Alexandra; Asokan, N; Sadeghi, Ahmad-Reza
2013 Best-effort authentication for opportunistic networks
Solis, J.; Ginzboorg, P.; Asokan, N.; Ott, J.
2011 ISBN: 978-1-4673-0010-0
Identity verification schemes for public transport ticketing with NFC phones
Tamrakar, Sandeep; Ekberg, Jan-Erik; Asokan, N.
2011 ISBN: 978-1-4503-1001-7
Can Hand-held Computers Still Be Better Smart Cards?
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka; Asokan, N.; Aura, Tuomas
2010 Security Associations in Personal Networks: A Comparative Analysis
Suomalainen, Jani; Valkonen, Jukka; Asokan, N.
2007 Usability Analysis of Secure Pairing Method
Uzun, Ersin; Karvonen, Kristiina; Asokan, N.
2007 ISBN: 978-3-540-77365-8
ISSN: 0302-9743
Ad-Hoc Security Associations for Groups
Valkonen, Jukka; Asokan, N.; Nyberg, Kaisa
2006 Man-in-the-Middle in Tunnelled Authentication Protocols
ASokan, N.; Niemi, Valtteri; Nyberg, Kaisa
2005 ISBN: 3-540-28389-7
Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri
2003 Non-refereed scientific articles
Unrefereed conference proceedingsTrusted execution environments on mobile devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.2013 ISBN: 978-1-4503-2477-9
Trusted execution environments on mobile devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.
2013 ISBN: 978-1-4503-2477-9
Scientific books (monographs)
BookMobile Platform Security
Asokan, N.; Davi, Lucas; Dmitrienko, Alexandra; Heuser, Stephan; Kostiainen, Kari; Reshetova, Elena; Sadeghi, Ahmad-Reza2014 ISBN: 978-1-6270-5097-5
Mobile Platform Security
Asokan, N.; Davi, Lucas; Dmitrienko, Alexandra; Heuser, Stephan; Kostiainen, Kari; Reshetova, Elena; Sadeghi, Ahmad-Reza
2014 ISBN: 978-1-6270-5097-5
Book (editor)CCS'13 co-located workshop summary for SPSM 2013
Enck, Willaim; Felt Porter, Adrienne; Asokan, N.2013 ISBN: 978-1-4503-2491-5
CCS'13 co-located workshop summary for SPSM 2013
Enck, Willaim; Felt Porter, Adrienne; Asokan, N.
2013 ISBN: 978-1-4503-2491-5
Publications intended for professional communities
Published development or research reportTRec: Relay-Resilient Transparent Authentication using Trajectory Recognition
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Martinovic, Ivan; Asokan, N2016 SELint: an SEAndroid policy analysis tool
Reshetova, Elena; Bonazzi, Filippo; Asokan, N2016 Characterizing SEAndroid Policies in the Wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishnkar; Asokan, N.2015 Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri2001
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition
Juuti, Mika; Vaas, Christian; Sluganovic, Ivo; Liljestrand, Hans; Martinovic, Ivan; Asokan, N
2016 SELint: an SEAndroid policy analysis tool
Reshetova, Elena; Bonazzi, Filippo; Asokan, N
2016 Characterizing SEAndroid Policies in the Wild
Reshetova, Elena; Bonazzi, Filippo; Nyman, Thomas; Borgaonkar, Ravishnkar; Asokan, N.
2015 Secure Vickrey Auctions without Threshold Trust
Lipmaa, Helger; Asokan, N.; Niemi, Valtteri
2001 Videos
N. Asokan: "Contextual security"
Read about executive education
Other experts
Looking for an expert?
Contact us and we'll find the best option for you.