Tuomas Aura

at Aalto University School of Business

Schools

  • Aalto University School of Business

Links

Biography

Aalto University School of Business

Peer-reviewed scientific articles

Journal article-refereed, Original research

Commitment-based device-pairing protocol with synchronized drawings and comparison metrics

Antikainen, Markku; Sethi, Mohit; Matetic, Sinisa; Aura, Tuomas
2015 in PERVASIVE AND MOBILE COMPUTING (Elsevier)
ISSN: 1574-1192

Denial-of-Service Attacks in Bloom-Filter-Based Forwarding

Antikainen, Markku; Aura, Tuomas; Särelä, Mikko
2014 in IEEE-ACM TRANSACTIONS ON NETWORKING (Institute of Electrical and Electronics Engineers Inc.)
ISSN: 1063-6692

Adaptive and context-aware privacy preservation exploiting user interactions in smart environments

Pallapa, Gautham; Das, Sajal K.; Di Francesco, Mario; Aura, Tuomas
2014 in PERVASIVE AND MOBILE COMPUTING (Elsevier)
ISSN: 1574-1192

Logout in single sign-on systems: problems and solutions.

Suoranta, Sanna; Manzoor, Kamran; Tontti, Asko; Ruuskanen, Joonas; Aura, Tuomas
2014 in Journal of Information Security and Applications (JISA) (Elsevier Limited)
ISSN: 2214-2126

A causal semantics for time Petri nets

Aura, T.; Lilius, J.
2000 in THEORETICAL COMPUTER SCIENCE (ELSEVIER SCIENCE BV)

Book section, Chapters in research books

Distributed access-rights management with delegation certificates

Aura, T.
1999

Conference proceedings

A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet

Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppanen, Ville
2017
ISBN: 9781509028566

An SDN-based approach to enhance the end-to-end security SSL/TLS case study

Ranjbar, Alireza; Komu, Miika; Salmela, Patrik; Aura, Tuomas
2016
ISBN: 9781509002238

Domain Isolation in a Multi-tenant Software-Defined Network

Ranjbar, Alireza; Antikainen, Markku; Aura, Tuomas
2016
ISBN: 9780769556970

We know where you are!

Rao, Siddharth Prakash; Oliver, Ian; Holtmanns, Silke; Aura, Tuomas
2016
ISBN: 9789949954483

Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs

Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppanen, Ville
2016
ISBN: 978-1-4503-4781-5

The Black Mark Beside My Name Server Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs

Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppänen, Ville
2016
ISBN: 9781509039463

Flooding DDoS Mitigation and Traffic Management with Software Defined Networking

Kalliola, Aapo; Lee, Kiryong; Lee, Heejo; Aura, Tuomas
2015
ISBN: 978-1-4673-9501-4

Unblocking stolen mobile devices using SS7-MAP vulnerabilities Exploiting the relationship between IMEI and IMSI for EIR access

Rao, Siddharth Prakash; Holtmanns, Silke; Oliver, Ian; Aura, Tuomas
2015
ISBN: 9781467379519

Secure and Low-Power Authentication for Resource-Constrained Devices

Sethi, Mohit; Kortoci, Pranvera; Di Francesco, Mario; Aura, Tuomas
2015
ISBN: 978-1-4673-8056-0

Flexible Management of Cloud-Connected Digital Signage

Sethi, Mohit; Lijding, Maria; Di Francesco, Mario; Aura, Tuomas
2015
ISBN: 978-1-4673-7211-4

Electronic Citizen Identities and Strong Authentication

Suoranta, Sanna; Haataja, Lari; Aura, Tuomas
2015
ISBN: 978-3-319-26501-8
ISSN: 0302-9743

Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch

Antikainen, Markku; Aura, Tuomas; Särelä, Mikko
2014
ISBN: 978-3-319-11598-6

Spatially aware malware infection modeling framework.

Kalliola, Aapo; Aura, Tuomas
2014

Denial-of-Service Mitigation for Internet Services

Kalliola, Aapo; Aura, Tuomas; Šcepanovic, Sanja
2014
ISBN: 978-3-319-11598-6

MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies

Oat, Elena; Di Francesco, Mario; Aura, Tuomas
2014

Commitment-based device pairing with synchronized drawing

Sethi, Mohit; Antikainen, Markku; Aura, Tuomas
2014

Secure Bootstrapping of Cloud-Managed Ubiquitous Displays

Sethi, Mohit; Oat, Elena; Di Francesco, Mario; Aura, Tuomas
2014

Logout in Single Sign-on Systems

Suoranta, Sanna; Tontti, Asko; Ruuskanen, Joonas; Aura, Tuomas
2013
ISBN: 978-3-642-37281-0
ISSN: 1868-4238

Scaling Bloom filter based multicast with hierarchical tree splitting

Rizvi, Sajjad; Zahemszky, András; Aura, Tuomas
2012
ISBN: 978-1-4577-2052-9
ISSN: 1550-3607

Strong Authentication with Mobile Phone

Suoranta, Sanna; Andrade, André; Aura, Tuomas
2012
ISBN: 978-3-642-33382-8
ISSN: 0302-9743

Applicability Analysis of Grid Security Mechanisms on Cloud Networking

Khan, Rasib; Komu, Miika; Aura, Tuomas
2011
ISBN: 978-1-4577-1635-5

Performance Analysis of HIP Diet Exchange for WSN Security Establishment

Nie, Pin; Vähä-Herttua, Juho; Aura, Tuomas; Gurtov, Andrei
2011
ISBN: 978-1-4503-0899-1

Security Analysis of Leap-of-Faith Protocols

Pham, Viet; Aura, Tuomas
2011

Forwarding Anomalies in Bloom Filter-based Multicast

Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, Andras; Nikander, Pekka; Ott, Jörg
2011 in IEEE INFOCOM (ICST)
ISBN: 978-1-4244-9921-2
ISSN: 0743-166X

How to share your favourite search result while preserving privacy and quality

Danezis, George; Aura, Tuomas; Shuo, Chen; Kiciman, Emre
2010
ISBN: 978-3-642-14526-1

Can Hand-held Computers Still Be Better Smart Cards?

Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka; Asokan, N.; Aura, Tuomas
2010

Privacy-preserving 802.11 access-point discovery

Lindqvist, Janne; Aura, Tuomas; Danezis, George; Koponen, Teemu; Myllyniemi, Annu; Mäki, Jussi; Roe, Michael
2009
ISBN: 978-1-60558-460-7

Chattering Laptops

Aura, Tuomas; Lindqvist, Janne; Roe, Michael; Mohammed, Anish
2008
ISBN: 978-3-540-70629-8

Analysis of the HIP Base Exchagne Protocol

Aura, Tuomas; Nagarajan, Aarthi; Gurtov, Andrei
2005
ISBN: 3-540-26547-3

Towards a Survivable Security Architecture for Ad-Hoc Networks

Aura, Tuomas; Mäki, Silja
2002

DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)

Aura, Tuomas
2001

DOS-Resistant Authentication with Client Puzzles

Aura, Tuomas; Nikander, Pekka; Leiwo, Jussipekka
2001

Analyzing single-server network inhibition

Aura, T.; Bishop, M.; Sniegowski, D.
2000

Using conservation of flow as a security mechanism in network protocols

Hughes, J.; Aura, T.; Bishop, M.
2000

Towards network denial of service resistant protocols

Leiwo, J.; Nikander, P.; Aura, T.
2000

Robust Membership Management for Ad-hoc Groups

Mäki, S.; Aura, T.; Hietalahti, M.
2000

Software license management with smart cards

Aura, T.; Gollmann, D.
1999

On the structure of delegation networks

Aura, T.
1998

Delegation-based access control for intelligent network services

Aura, T.; Koponen, P.; Räsänen, J.
1998

Fast access control decisions from delegation certificate databases

Aura, T.
1998

Stateless connections, in proceedings of International Conference on Information and Communications Security

Aura, Tuomas; Nikander, P.
1997

Strategies against replay attacks

Aura, T.
1997

Time processes of time Petri nets in proceedings

Aura, Tuomas; Lilius, J.
1997

Comparison of graph-search algorithms for authorization verification in delegation networks

Aura, T.
1997

Using multimodal logic to express conflicting interests in security protocols in proceedings of DIMACS Workshop on Design and formal verification of security protocols

Huima, Antti; Aura, T.
1997

Practical invisiblity in digital communication

Aura, Tuomas
1996

Non-refereed scientific articles

Unrefereed journal articles

Symbian OS Platform Security Model

Li, Bo; Reshetova, Elena; Aura, Tuomas
2010 in ;login: The USENIX Magazine (Springer Verlag)

Scientific books (monographs)

Book (editor)

Information Security Technology for Applications, 15th Nordic Conference on Secure IT Systems, NordSec 2010, Aalto University, Finland, October 27-29, 2010, Revised Selected Papers

Aura, Tuomas; Järvinen, Kimmo; Nyberg, Kaisa
2012
ISBN: 978-3-642-27936-2

Publications intended for professional communities

Published development or research report

Application of Public Ledgers to Revocation in Distributed Access Control

Bui, Tien; Aura, Tuomas
2016

Forwarding Anomalies in Bloom Filter Based Multicast

Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, András; Nikander, Pekka; Ott, Jörg
2010

Privacy and Accountability in Certificate Systems

Aura, T.; Ellison, C.
2000

Authorization and Availability - Aspects of Open Network Security

Aura, T.
2000

Stateless connections

Aura, T.; Nikander, P.
1997

On the structure of delegation networks Licentiate's Thesis

Aura, T.
1997

Time Processes of Time Petri Nets

Aura, T.
1996

Modelling the Needham-Schröder Authentication Protocol with High Level Petri Nets

Aura, Tuomas
1995

Read about executive education

Other experts

Rachel Aleks

Overview Rachel Aleks joined the School of Industrial and Labor Relations in 2014 as an Assistant Professor of Labor Relations. She earned her Ph.D. in Industrial Relations and Human Resources from the University of Toronto in 2014 and her B.Com in International Management from McGill University ...

Looking for an expert?

Contact us and we'll find the best option for you.

Something went wrong. We're trying to fix this error.