Tuomas Aura

Follow

Generating author description...

All published works
Action Title Year Authors
+ PDF Chat Misbinding Raw Public Keys to Identities in TLS 2024 Mariam Moustafa
Mohit Sethi
Tuomas Aura
+ PDF Chat Security Analysis of the Consumer Remote SIM Provisioning Protocol 2024 Abu Shohel Ahmed
Aleksi Peltonen
Mohit Sethi
Tuomas Aura
+ Threat modeling framework for mobile communication systems 2022 Siddharth Prakash Rao
Hsin‐Yi Chen
Tuomas Aura
+ Security Analysis of the Consumer Remote SIM Provisioning Protocol 2022 Abu Shohel Ahmed
Aleksi Peltonen
Mohit Sethi
Tuomas Aura
+ PDF Chat XSS Vulnerabilities in Cloud-Application Add-Ons 2020 Thanh Bui
Siddharth Prakash Rao
Markku Antikainen
Tuomas Aura
+ Threat modeling framework for mobile communication systems 2020 Siddharth Prakash Rao
Silke Holtmanns
Tuomas Aura
+ Client-side Vulnerabilities in Commercial VPNs 2019 Thanh Bui
Siddharth Prakash Rao
Markku Antikainen
Tuomas Aura
+ XSS Vulnerabilities in Cloud-Application Add-Ons 2019 Thanh Bui
Siddharth Prakash Rao
Markku Antikainen
Tuomas Aura
+ Misbinding Attacks on Secure Device Pairing and Bootstrapping 2019 Mohit Sethi
Aleksi Peltonen
Tuomas Aura
+ Misbinding Attacks on Secure Device Pairing. 2019 Mohit Sethi
Aleksi Peltonen
Tuomas Aura
+ PDF Chat Client-Side Vulnerabilities in Commercial VPNs 2019 Thanh Bui
Siddharth Prakash Rao
Markku Antikainen
Tuomas Aura
+ Client-side Vulnerabilities in Commercial VPNs 2019 Thanh Cong Bui
Siddharth Prakash Rao
Markku Antikainen
Tuomas Aura
+ XSS Vulnerabilities in Cloud-Application Add-Ons 2019 Thanh Bui
Siddharth Prakash Rao
Markku Antikainen
Tuomas Aura
+ PDF Chat Application of Public Ledgers to Revocation in Distributed Access Control 2018 Thanh Bui
Tuomas Aura
+ Key exchange with the help of a public ledger 2017 Thanh Bui
Tuomas Aura
+ PDF Chat Key Exchange with the Help of a Public Ledger 2017 Thanh Bui
Tuomas Aura
+ Key exchange with the help of a public ledger 2017 Thanh Bui
Tuomas Aura
+ Malware distributions and graph structure of the Web 2017 Sanja Šćepanović
Igor Mishkovski
Jukka Ruohonen
Frederick Ayala-Gómez
Tuomas Aura
Sami Hyrynsalmi
+ Application of Public Ledgers to Revocation in Distributed Access Control 2016 Thanh Bui
Tuomas Aura
+ Application of Public Ledgers to Revocation in Distributed Access Control 2016 Thanh Bui
Tuomas Aura
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem 2016 Paweł Szałachowski
Laurent Chuat
Adrian Perrig
4
+ Application of Public Ledgers to Revocation in Distributed Access Control 2016 Thanh Bui
Tuomas Aura
2
+ PDF Chat A Formal Analysis of 5G Authentication 2018 David Basin
Jannik Dreier
Lucca Hirschi
Saša Radomirović
Ralf Sasse
Vincent Stettler
2
+ PDF Chat Generative Adversarial Networks: An Overview 2018 Antonia Creswell
Tom White
Vincent Dumoulin
Kai Arulkumaran
Biswa Sengupta
Anil A. Bharath
1
+ PDF Chat Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes 2017 Mohamed Amine Ferrag
Λέανδρος Μαγλαράς
Antonios Argyriou
Dimitrios Kosmanos
Helge Janicke
1
+ PDF Chat LTE PHY layer vulnerability analysis and testing using open-source SDR tools 2017 Raghunandan M. Rao
Sean Ha
Vuk Marojevic
Jeffrey H. Reed
1
+ Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems 2016 Altaf Shaik
Ravishankar Borgaonkar
N. Asokan
Valtteri Niemi
Jean‐Pierre Seifert
1
+ PDF Chat On Security Research Towards Future Mobile Network Generations 2018 David Rupprecht
Adrian Dabrowski
Thorsten Holz
Edgar Weippl
Christina Pöpper
1
+ PDF Chat One leak will sink a ship: WebRTC IP address leaks 2017 Nasser Mohammed Al-Fannah
1
+ PDF Chat Vulnerability of LTE to hostile interference 2013 Marc Lichtman
Jeffrey H. Reed
T. Charles Clancy
Mark Norton
1
+ PDF Chat The EMV Standard: Break, Fix, Verify 2021 David Basin
Ralf Sasse
Jorge Toro-Pozo
1
+ PDF Chat Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication 2007 Elad Barkan
Eli Biham
Nathan Keller
1
+ LTE security, protocol exploits and location tracking experimentation with low-cost software radio 2016 Roger Piqueras Jover
1