Jussipekka Leiwo
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2000 – 2009
- 2008
[j4]Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
A Study on the Security of Privacy Homomorphism. I. J. Network Security 6(1): 33-39 (2008)
[j3]Yi Wang, Douglas L. Maskell, Jussipekka Leiwo:
A unified architecture for a public key cryptographic coprocessor. Journal of Systems Architecture - Embedded Systems Design 54(10): 1004-1016 (2008)- 2007
[c24]Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
Private stateful circuits secure against probing attacks. AsiaCCS 2007: 63-69- 2006
[j2]Jussipekka Leiwo, Lam-for Kwok, Douglas L. Maskell, Nenad Stankovic:
A technique for expressing IT security objectives. Information & Software Technology 48(7): 532-539 (2006)
[c23]Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
Hiding Circuit Topology from Unbounded Reverse Engineers. ACISP 2006: 171-182
[c22]Yi Wang, Douglas L. Maskell, Jussipekka Leiwo, Thambipillai Srikanthan:
Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. APCCAS 2006: 1655-1658
[c21]Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Luo Jianwen:
An Efficient Algorithm for DPA-resistent RSA. APCCAS 2006: 1659-1662
[c20]Douglas L. Maskell, Jussipekka Leiwo, Jagdish Chandra Patra:
The design of multiplierless FIR filters with a minimum adder step and reduced hardware complexity. ISCAS 2006
[c19]Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
A Study on the Security of Privacy Homomorphism. ITNG 2006: 470-475
[c18]Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan, Yu Yu:
FPGA based DPA-resistant Unified Architecture for Signcryption. ITNG 2006: 571-572- 2005
[j1]Jussipekka Leiwo, Teemupekka Virtanen:
Understanding and Communicating It Security Specifications with Uml. International Journal of Software Engineering and Knowledge Engineering 15(6): 923-940 (2005)
[c17]Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
An Improved Secure Two-Party Computation Protocol. CISC 2005: 221-232
[c16]Yi Wang, Jussipekka Leiwo, Thambipillai Srikanthan:
Efficient high radix modular multiplication for high-speed computing in re-configurable hardware [cryptographic applications]. ISCAS (2) 2005: 1226-1229
[c15]Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
Securely Utilizing External Computing Power. ITCC (1) 2005: 762-767- 2000
[c14]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
High Performance Agile Crypto Modules. ACISP 2000: 74-88
[c13]Jussipekka Leiwo, Tuomas Aura, Pekka Nikander:
Towards Network Denial of Service Resistant Protocols. SEC 2000: 301-310
[c12]Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Andrew S. Tanenbaum:
Disallowing Unauthorized State Changes of Distributed Shared Objects. SEC 2000: 381-390
[c11]Tuomas Aura, Pekka Nikander, Jussipekka Leiwo:
DOS-Resistant Authentication with Client Puzzles. Security Protocols Workshop 2000: 170-177
1990 – 1999
- 1999
[c10]Jussipekka Leiwo, Chandana Gamage, Yuliang Zheng:
Organizational Modeling for Efficient Specification of Information Security Requirements. ADBIS 1999: 247-260
[c9]Jussipekka Leiwo:
A Mechanism for Deriving Specifications of Security Functions in the CC Framework. DEXA 1999: 416-425
[c8]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. ICISC 1999: 120-131
[c7]Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum:
A Security Design for a Wide-Area Distributed System. ICISC 1999: 236-256
[c6]Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
Encrypted Message Authentication by Firewalls. Public Key Cryptography 1999: 69-81- 1998
[c5]Jussipekka Leiwo, Seppo Heikkuri:
An Analysis of Ethics as Foundation of Information Security in Distributed Systems. HICSS (6) 1998: 213-222- 1997
[c4]Jussipekka Leiwo, Yuliang Zheng:
A Method to Implement a Denial of Service Protection Base. ACISP 1997: 90-101
[c3]Jussipekka Leiwo, Yuliang Zheng:
A Framework for the Management of Information Security. ISW 1997: 232-245
[c2]
[c1]Jussipekka Leiwo, Yuliang Zheng:
A formal model to aid documenting and harmonizing of information security requirements. SEC 1997: 25-38
Coauthor Index
last updated on 2018-03-07 10:08 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint



Google
Google Scholar
MS Academic
CiteSeerX
CORE
Semantic Scholar