Pekka Nikander
Professor (Professor of Practice), Industrial Internet at Aalto University School of Business
Schools
- Aalto University School of Business
Links
Biography
Aalto University School of Business
Peer-reviewed scientific articles
Journal article-refereed, Original researchHost Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks
Nikander, Pekka; Gurtov, Andrei; Henderson, Thomas R.2010 in IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (Institute of Electrical and Electronics Engineers Inc.)Hi3: An efficient and secure networking architecture for mobile hosts
Gurtov, Andrei; Korzun, Dmitry; Lukyanenko, Andrey; Nikander, Pekka2008 in COMPUTER COMMUNICATIONS (Elsevier)ISSN: 0140-3664Book section, Chapters in research booksHIP: Host Identity Protocol
Nikander, Pekka; Gurtov, Andrei; Henderson, Thomas2011 ISBN: 9780521113687From address orientation to host orientation
Nikander, Pekka; Candolin, Catharina; Lundberg, Janne2002 A Java Beans Framework for Cryptographic Protocols
Nikander, P.; Pärssinen, J.1999 Conference proceedingsTowards energy-efficient HealthCare An Internet-of-Things architecture using intelligent gateways
Granados, Jose; Rahmani, Amir Mohammad; Nikander, Pekka; Liljeberg, Pasi; Tenhunen, Hannu2015 ISBN: 9781631900143Web-Enabled intelligent gateways for eHealth Internet-of-Things
Granados, Jose; Rahmani, Amir Mohammad; Nikander, Pekka; Liljeberg, Pasi; Tenhunen, Hannu2015 in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Springer-Verlag)ISBN: 9783319196558ISSN: 1867-8211Towards understanding pure publish/subscribe cryptographic protocols
Nikander, Pekka; Marias, Giannis F.2011 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Springer-Verlag)ISBN: 9783642221361ISSN: 0302-9743Forwarding Anomalies in Bloom Filter-based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, Andras; Nikander, Pekka; Ott, Jörg2011 in IEEE INFOCOM (Springer-Verlag)ISBN: 978-1-4244-9921-2ISSN: 0743-166XOn Content-Centric Router Design and Implications
Ariafar, Somaya; Nikander, Pekka; Ott, Jörg2010 A transport protocol for content-centric networks
Arianfar, Somaya; Ott, Jörg; Eggert, Lars; Nikander, Pekka; Wong, Water2010 BloomCast: Security in Bloom Filter Based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Zahemszky, András; Nikander, Pekka; Ott, Jörg2010 Combining Radio and Internetworking: Towards a Unified Architecture
Nikander, Pekka; Pouttu, Ari; Tarkoma, Sasu; Kangasharju, Jussi; Talvitie, Jaakko; Latva-aho, Matti2008 Incentive-Compatible Caching and Peering in Data-Oriented Networks
Rajahalme, Jarno; Särelä, Mikko; Nikander, Pekka; Tarkoma, Sasu2008 Dynamic Local Clustering for Hierarchical Ad Hoc Networks
Schaeffer, Satu Elisa; Marinoni, Stefano; Särelä, Mikko; Nikander, Pekka2006 Hi3: An Efficient and Secure Networking Architecture for Mobile Hosts
Gurtov, Andrei; Korzun, Dmitry; Nikander, Pekka2005 ISSN: 1458-9478Application Mobility with HIP
Koponen, Teemu; Gurtov, Andrei; Nikander, Pekka2005 ISBN: 0-9584901-3-9Applying Host Identity Protocol to Tactical Networks
Särelä, Mikko; Nikander, Pekka2004 Experimenting with early opportunistic key agreement
Candolin, Catharina; Lundberg, Janne; Nikander, P.2002 DOS-Resistant Authentication with Client Puzzles
Aura, Tuomas; Nikander, Pekka; Leiwo, Jussipekka2001 IPv6 Source Addresses Considered Harmful
Candolin, Catharina; Nikander, Pekka2001 Decentralized Jini Security
Eronen, Pasi; Nikander, Pekka2001 TCP and UDP in the Mobile World, or What is Wrong with Mobile IP version 6, and How to Fix it
Nikander, Pekka2001 Securing ad hoc Jini services
Eronen, P.; Gehrmann, C.; Nikander, P.2000 Extending Jini with decentralized trust management
Eronen, P.; Lehtinen, J.; Zitting, J.; Nikander, P.2000 Internet access through WLAN with XML encoded SPKI certificates
Koponen, J.; Nikander, P.; Räsänen, J.; Pääjärvi, J.2000 Towards network denial of service resistant protocols
Leiwo, J.; Nikander, P.; Aura, T.2000 Policy and Trust in Open Multi-Operator Networks
Nikander, P.; Metso, L.2000 Combining Trust Management, Jini, IPv6 and Wireless Links: A Proposal for a Service Network Architecture for Ad Hoc Environments
Nikander, P.2000 Fault Tolerance in Decentralized and Loosely Coupled Systems
Nikander, P.2000 An Operating System in Java for the Lego Mindstroms RCX Microcontroller
Nikander, P.2000 Distributed policy management for JDK 1.2
Nikander, P.; Partanen, J.1999 Preserving Privacy with Certificates in Distributed Delegation
Nikander, P.; Kortesniemi, Y.; Partanen, J.1999 A Secure Agent Architecture in Java 2
Nikander, P.; Wall, J.1999 A Java Beans Component Architecture for Cryptographic Protocols
Nikander, P.; Karila, A.1998 Storing and Retrieving Internet Certificates
Nikander, P.; Viljanen, L.1998 Adding SPKI Certificates to JDK 1.2
Partanen, J.; Nikander, P.1998 Stateless connections, in proceedings of International Conference on Information and Communications Security
Aura, Tuomas; Nikander, P.1997 A Modular, STREAMS Based IPSEC for Solaris 2.x Systems
Aalto, T.; Nikander, P.1996 Publications intended for professional communities
Published development or research reportPacket-level Caching for Information-centric Networking
Arianfar, Somaya; Nikander, Pekka; Ott, Jörg2010 Forwarding Anomalies in Bloom Filter Based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, András; Nikander, Pekka; Ott, Jörg2010 Techno-Economic Analysis of Internet Architecture Evolution
Hämmäinen, Heikki; Nikander, Pekka; Ott, Jörg; Heikkinen, Mikko2009 Identifier/Locator Split and DHTs, Proceedings of the Research Seminar on Telecommunications Software, Fall 2004
Nikander, Pekka; Gurtov, Andrei; Hlinovsky, Jan; Ylikerälä, Markus; Särelä, Mikko; Ylitalo, Jukka; Zhou, Wenpeng; Yang, Zhirong; Koponen, Teemu; Salmela, Patrik; Camarillo, Gonzalo; Grenman, Thomas; Al-Mohammed, Mousa; Pohan, Henry L.E.; Komu, Miika; Wall, Jorma; Hautakorpi, Jani; Ylitalo, Katri2004 Local clustering for hierarchical ad hoc networks
Virtanen, Satu Elisa; Nikander, Pekka2004 Stateless connections
Aura, T.; Nikander, P.1997
Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks
Hi3: An efficient and secure networking architecture for mobile hosts
HIP: Host Identity Protocol
From address orientation to host orientation
A Java Beans Framework for Cryptographic Protocols
Conference proceedingsTowards energy-efficient HealthCare An Internet-of-Things architecture using intelligent gateways
Granados, Jose; Rahmani, Amir Mohammad; Nikander, Pekka; Liljeberg, Pasi; Tenhunen, Hannu2015 ISBN: 9781631900143Web-Enabled intelligent gateways for eHealth Internet-of-Things
Granados, Jose; Rahmani, Amir Mohammad; Nikander, Pekka; Liljeberg, Pasi; Tenhunen, Hannu2015 in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Springer-Verlag)ISBN: 9783319196558ISSN: 1867-8211Towards understanding pure publish/subscribe cryptographic protocols
Nikander, Pekka; Marias, Giannis F.2011 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Springer-Verlag)ISBN: 9783642221361ISSN: 0302-9743Forwarding Anomalies in Bloom Filter-based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, Andras; Nikander, Pekka; Ott, Jörg2011 in IEEE INFOCOM (Springer-Verlag)ISBN: 978-1-4244-9921-2ISSN: 0743-166XOn Content-Centric Router Design and Implications
Ariafar, Somaya; Nikander, Pekka; Ott, Jörg2010 A transport protocol for content-centric networks
Arianfar, Somaya; Ott, Jörg; Eggert, Lars; Nikander, Pekka; Wong, Water2010 BloomCast: Security in Bloom Filter Based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Zahemszky, András; Nikander, Pekka; Ott, Jörg2010 Combining Radio and Internetworking: Towards a Unified Architecture
Nikander, Pekka; Pouttu, Ari; Tarkoma, Sasu; Kangasharju, Jussi; Talvitie, Jaakko; Latva-aho, Matti2008 Incentive-Compatible Caching and Peering in Data-Oriented Networks
Rajahalme, Jarno; Särelä, Mikko; Nikander, Pekka; Tarkoma, Sasu2008 Dynamic Local Clustering for Hierarchical Ad Hoc Networks
Schaeffer, Satu Elisa; Marinoni, Stefano; Särelä, Mikko; Nikander, Pekka2006 Hi3: An Efficient and Secure Networking Architecture for Mobile Hosts
Gurtov, Andrei; Korzun, Dmitry; Nikander, Pekka2005 ISSN: 1458-9478Application Mobility with HIP
Koponen, Teemu; Gurtov, Andrei; Nikander, Pekka2005 ISBN: 0-9584901-3-9Applying Host Identity Protocol to Tactical Networks
Särelä, Mikko; Nikander, Pekka2004 Experimenting with early opportunistic key agreement
Candolin, Catharina; Lundberg, Janne; Nikander, P.2002 DOS-Resistant Authentication with Client Puzzles
Aura, Tuomas; Nikander, Pekka; Leiwo, Jussipekka2001 IPv6 Source Addresses Considered Harmful
Candolin, Catharina; Nikander, Pekka2001 Decentralized Jini Security
Eronen, Pasi; Nikander, Pekka2001 TCP and UDP in the Mobile World, or What is Wrong with Mobile IP version 6, and How to Fix it
Nikander, Pekka2001 Securing ad hoc Jini services
Eronen, P.; Gehrmann, C.; Nikander, P.2000 Extending Jini with decentralized trust management
Eronen, P.; Lehtinen, J.; Zitting, J.; Nikander, P.2000 Internet access through WLAN with XML encoded SPKI certificates
Koponen, J.; Nikander, P.; Räsänen, J.; Pääjärvi, J.2000 Towards network denial of service resistant protocols
Leiwo, J.; Nikander, P.; Aura, T.2000 Policy and Trust in Open Multi-Operator Networks
Nikander, P.; Metso, L.2000 Combining Trust Management, Jini, IPv6 and Wireless Links: A Proposal for a Service Network Architecture for Ad Hoc Environments
Nikander, P.2000 Fault Tolerance in Decentralized and Loosely Coupled Systems
Nikander, P.2000 An Operating System in Java for the Lego Mindstroms RCX Microcontroller
Nikander, P.2000 Distributed policy management for JDK 1.2
Nikander, P.; Partanen, J.1999 Preserving Privacy with Certificates in Distributed Delegation
Nikander, P.; Kortesniemi, Y.; Partanen, J.1999 A Secure Agent Architecture in Java 2
Nikander, P.; Wall, J.1999 A Java Beans Component Architecture for Cryptographic Protocols
Nikander, P.; Karila, A.1998 Storing and Retrieving Internet Certificates
Nikander, P.; Viljanen, L.1998 Adding SPKI Certificates to JDK 1.2
Partanen, J.; Nikander, P.1998 Stateless connections, in proceedings of International Conference on Information and Communications Security
Aura, Tuomas; Nikander, P.1997 A Modular, STREAMS Based IPSEC for Solaris 2.x Systems
Aalto, T.; Nikander, P.1996 Publications intended for professional communities
Published development or research reportPacket-level Caching for Information-centric Networking
Arianfar, Somaya; Nikander, Pekka; Ott, Jörg2010 Forwarding Anomalies in Bloom Filter Based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, András; Nikander, Pekka; Ott, Jörg2010 Techno-Economic Analysis of Internet Architecture Evolution
Hämmäinen, Heikki; Nikander, Pekka; Ott, Jörg; Heikkinen, Mikko2009 Identifier/Locator Split and DHTs, Proceedings of the Research Seminar on Telecommunications Software, Fall 2004
Nikander, Pekka; Gurtov, Andrei; Hlinovsky, Jan; Ylikerälä, Markus; Särelä, Mikko; Ylitalo, Jukka; Zhou, Wenpeng; Yang, Zhirong; Koponen, Teemu; Salmela, Patrik; Camarillo, Gonzalo; Grenman, Thomas; Al-Mohammed, Mousa; Pohan, Henry L.E.; Komu, Miika; Wall, Jorma; Hautakorpi, Jani; Ylitalo, Katri2004 Local clustering for hierarchical ad hoc networks
Virtanen, Satu Elisa; Nikander, Pekka2004 Stateless connections
Aura, T.; Nikander, P.1997
Towards energy-efficient HealthCare An Internet-of-Things architecture using intelligent gateways
Web-Enabled intelligent gateways for eHealth Internet-of-Things
Towards understanding pure publish/subscribe cryptographic protocols
Forwarding Anomalies in Bloom Filter-based Multicast
On Content-Centric Router Design and Implications
A transport protocol for content-centric networks
BloomCast: Security in Bloom Filter Based Multicast
Combining Radio and Internetworking: Towards a Unified Architecture
Incentive-Compatible Caching and Peering in Data-Oriented Networks
Dynamic Local Clustering for Hierarchical Ad Hoc Networks
Hi3: An Efficient and Secure Networking Architecture for Mobile Hosts
Application Mobility with HIP
Applying Host Identity Protocol to Tactical Networks
Experimenting with early opportunistic key agreement
DOS-Resistant Authentication with Client Puzzles
IPv6 Source Addresses Considered Harmful
Decentralized Jini Security
TCP and UDP in the Mobile World, or What is Wrong with Mobile IP version 6, and How to Fix it
Securing ad hoc Jini services
Extending Jini with decentralized trust management
Internet access through WLAN with XML encoded SPKI certificates
Towards network denial of service resistant protocols
Policy and Trust in Open Multi-Operator Networks
Combining Trust Management, Jini, IPv6 and Wireless Links: A Proposal for a Service Network Architecture for Ad Hoc Environments
Fault Tolerance in Decentralized and Loosely Coupled Systems
An Operating System in Java for the Lego Mindstroms RCX Microcontroller
Distributed policy management for JDK 1.2
Preserving Privacy with Certificates in Distributed Delegation
A Secure Agent Architecture in Java 2
A Java Beans Component Architecture for Cryptographic Protocols
Storing and Retrieving Internet Certificates
Adding SPKI Certificates to JDK 1.2
Stateless connections, in proceedings of International Conference on Information and Communications Security
A Modular, STREAMS Based IPSEC for Solaris 2.x Systems
Packet-level Caching for Information-centric Networking
Forwarding Anomalies in Bloom Filter Based Multicast
Techno-Economic Analysis of Internet Architecture Evolution
Identifier/Locator Split and DHTs, Proceedings of the Research Seminar on Telecommunications Software, Fall 2004
Local clustering for hierarchical ad hoc networks
Stateless connections
Read about executive education
Other experts
Ben Charoenwong
Ben Charoenwong is an Assistant Professor in Finance at the National University of Singapore Business School. His research includes studying the interaction of supply chain and financial leverage decisions, pricing the voting component of common stock, and the regulation of investment advisers. ...
John Fisher
EDUCATION M.B.A., Boston College, 1971 B.A., Marietta College, 1969 EXPERTISE/RESEARCH/TEACHING INTERESTS Professor Fisher''s teachings focus on strategic brand mamagement. His exprtise includes brand identity, structure, and maintenance. He also has experience with communication platform dev...
Kate Craven
Kate started her career in the City at Mitsubishi Trust International in 1987, followed by Kidder, Peabody International. From 1993 until 2003 she worked for Merrill Lynch International where she was the Head of TMG. Between 2003 and 2013 Kate worked for Barclays Capital as a Director in the Lega...
Popular Courses
The Positive Leader: Deep Change and Organizational Transformation
Stephen M. Ross School of Business
Ann Arbor, Michigan, United States
Dec 1
Leading People and Teams
ESMT
Berlin, Germany
Nov 19
Private Equity: Investing and Creating Value
The Wharton School
Philadelphia, Pennsylvania, United States
Feb 2, 2025
Looking for an expert?
Contact us and we'll find the best option for you.