User profiles for Tuomas Aura

Tuomas Aura

Professor of Computer Science and Engineering, Aalto University
Verified email at aalto.fi
Cited by 6578

Cryptographically generated addresses (CGA)

T Aura - International Conference on Information Security, 2003 - Springer
Cryptographically generated addresses (CGA) are IPv6 addresses some address bits are
generated by hashing the address owner’s public key. The address owner uses the …

Denial-of-service attacks in bloom-filter-based forwarding

M Antikainen, T Aura, M Särelä - IEEE/ACM Transactions On …, 2013 - ieeexplore.ieee.org
Bloom-filter-based forwarding has been suggested to solve several fundamental problems
in the current Internet, such as routing-table growth, multicast scalability issues, and denial-of-…

DOS-resistant authentication with client puzzles

T Aura, P Nikander, J Leiwo - International workshop on security protocols, 2000 - Springer
Denial of service by server resource exhaustion has become a major security threat in open
communications networks. Public-key authentication does not completely protect against the …

Scanning electronic documents for personally identifiable information

T Aura, TA Kuhn, M Roe - Proceedings of the 5th ACM workshop on …, 2006 - dl.acm.org
Sometimes, it is necessary to remove author names and other personally identifiable information
(PII) from documents before publication. We have implemented a novel defensive tool …

Spook in your network: Attacking an sdn with a compromised openflow switch

M Antikainen, T Aura, M Särelä - … 2014, Tromsø, Norway, October 15-17 …, 2014 - Springer
Software defined networking (SDN) and OpenFlow as one of its key technologies have
received a lot of attention from the networking community. While SDN enables complex network …

Strategies against replay attacks

T Aura - Proceedings 10th Computer Security Foundations …, 1997 - ieeexplore.ieee.org
The goal of the paper is to present a set of design principles for avoiding replay attacks in
cryptographic protocols. The principles are easily applied to real protocols and they do not …

[HTML][HTML] Mobile IP version 6 route optimization security design background

P Nikander, J Arkko, T Aura, G Montenegro… - 2005 - rfc-editor.org
Aura … [1] Aura, T., Roe, M., and J. Arkko, "Security of Internet Location … Tuomas Aura

Forwarding anomalies in Bloom filter-based multicast

M Särelä, CE Rothenberg, T Aura… - 2011 Proceedings …, 2011 - ieeexplore.ieee.org
Several recently proposed multicast protocols use in-packet Bloom filters to encode multicast
trees. These mechanisms are in principle highly scalable because no per-flow state is …

Practical invisibility in digital communication

T Aura - … Hiding: First International Workshop Cambridge, UK …, 1996 - Springer
This paper gives an overview of cryptographically strong mass application invisibility in
digital communication. It summarizes principles and methodology, clarifies terminology, and …

Stateless connections

T Aura, P Nikander - International Conference on Information and …, 1997 - Springer
We describe a secure transformation of stateful connections or parts of them into stateless
ones by attaching the state information to the messages. Secret-key cryptography is used for …