User profiles for Tuomas Aura
Tuomas AuraProfessor of Computer Science and Engineering, Aalto University Verified email at aalto.fi Cited by 6578 |
Cryptographically generated addresses (CGA)
T Aura - International Conference on Information Security, 2003 - Springer
Cryptographically generated addresses (CGA) are IPv6 addresses some address bits are
generated by hashing the address owner’s public key. The address owner uses the …
generated by hashing the address owner’s public key. The address owner uses the …
Denial-of-service attacks in bloom-filter-based forwarding
Bloom-filter-based forwarding has been suggested to solve several fundamental problems
in the current Internet, such as routing-table growth, multicast scalability issues, and denial-of-…
in the current Internet, such as routing-table growth, multicast scalability issues, and denial-of-…
DOS-resistant authentication with client puzzles
T Aura, P Nikander, J Leiwo - International workshop on security protocols, 2000 - Springer
Denial of service by server resource exhaustion has become a major security threat in open
communications networks. Public-key authentication does not completely protect against the …
communications networks. Public-key authentication does not completely protect against the …
Scanning electronic documents for personally identifiable information
T Aura, TA Kuhn, M Roe - Proceedings of the 5th ACM workshop on …, 2006 - dl.acm.org
Sometimes, it is necessary to remove author names and other personally identifiable information
(PII) from documents before publication. We have implemented a novel defensive tool …
(PII) from documents before publication. We have implemented a novel defensive tool …
Spook in your network: Attacking an sdn with a compromised openflow switch
Software defined networking (SDN) and OpenFlow as one of its key technologies have
received a lot of attention from the networking community. While SDN enables complex network …
received a lot of attention from the networking community. While SDN enables complex network …
Strategies against replay attacks
T Aura - Proceedings 10th Computer Security Foundations …, 1997 - ieeexplore.ieee.org
The goal of the paper is to present a set of design principles for avoiding replay attacks in
cryptographic protocols. The principles are easily applied to real protocols and they do not …
cryptographic protocols. The principles are easily applied to real protocols and they do not …
[HTML][HTML] Mobile IP version 6 route optimization security design background
… Aura … [1] Aura, T., Roe, M., and J. Arkko, "Security of Internet Location … Tuomas Aura …
Forwarding anomalies in Bloom filter-based multicast
Several recently proposed multicast protocols use in-packet Bloom filters to encode multicast
trees. These mechanisms are in principle highly scalable because no per-flow state is …
trees. These mechanisms are in principle highly scalable because no per-flow state is …
Practical invisibility in digital communication
T Aura - … Hiding: First International Workshop Cambridge, UK …, 1996 - Springer
This paper gives an overview of cryptographically strong mass application invisibility in
digital communication. It summarizes principles and methodology, clarifies terminology, and …
digital communication. It summarizes principles and methodology, clarifies terminology, and …
Stateless connections
T Aura, P Nikander - International Conference on Information and …, 1997 - Springer
We describe a secure transformation of stateful connections or parts of them into stateless
ones by attaching the state information to the messages. Secret-key cryptography is used for …
ones by attaching the state information to the messages. Secret-key cryptography is used for …