Tuomas Aura
at Aalto University School of Business
Schools
- Aalto University School of Business
Links
Biography
Aalto University School of Business
Peer-reviewed scientific articles
Journal article-refereed, Original researchCommitment-based device-pairing protocol with synchronized drawings and comparison metrics
Antikainen, Markku; Sethi, Mohit; Matetic, Sinisa; Aura, Tuomas2015 in PERVASIVE AND MOBILE COMPUTING (Elsevier)ISSN: 1574-1192Denial-of-Service Attacks in Bloom-Filter-Based Forwarding
Antikainen, Markku; Aura, Tuomas; Särelä, Mikko2014 in IEEE-ACM TRANSACTIONS ON NETWORKING (Institute of Electrical and Electronics Engineers Inc.)ISSN: 1063-6692Adaptive and context-aware privacy preservation exploiting user interactions in smart environments
Pallapa, Gautham; Das, Sajal K.; Di Francesco, Mario; Aura, Tuomas2014 in PERVASIVE AND MOBILE COMPUTING (Elsevier)ISSN: 1574-1192Logout in single sign-on systems: problems and solutions.
Suoranta, Sanna; Manzoor, Kamran; Tontti, Asko; Ruuskanen, Joonas; Aura, Tuomas2014 in Journal of Information Security and Applications (JISA) (Elsevier Limited)ISSN: 2214-2126A causal semantics for time Petri nets
Aura, T.; Lilius, J.2000 in THEORETICAL COMPUTER SCIENCE (ELSEVIER SCIENCE BV)Book section, Chapters in research booksDistributed access-rights management with delegation certificates
Aura, T.1999 Conference proceedingsA post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet
Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppanen, Ville2017 ISBN: 9781509028566An SDN-based approach to enhance the end-to-end security SSL/TLS case study
Ranjbar, Alireza; Komu, Miika; Salmela, Patrik; Aura, Tuomas2016 ISBN: 9781509002238Domain Isolation in a Multi-tenant Software-Defined Network
Ranjbar, Alireza; Antikainen, Markku; Aura, Tuomas2016 ISBN: 9780769556970We know where you are!
Rao, Siddharth Prakash; Oliver, Ian; Holtmanns, Silke; Aura, Tuomas2016 ISBN: 9789949954483Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs
Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppanen, Ville2016 ISBN: 978-1-4503-4781-5The Black Mark Beside My Name Server Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs
Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppänen, Ville2016 ISBN: 9781509039463Flooding DDoS Mitigation and Traffic Management with Software Defined Networking
Kalliola, Aapo; Lee, Kiryong; Lee, Heejo; Aura, Tuomas2015 ISBN: 978-1-4673-9501-4Unblocking stolen mobile devices using SS7-MAP vulnerabilities Exploiting the relationship between IMEI and IMSI for EIR access
Rao, Siddharth Prakash; Holtmanns, Silke; Oliver, Ian; Aura, Tuomas2015 ISBN: 9781467379519Secure and Low-Power Authentication for Resource-Constrained Devices
Sethi, Mohit; Kortoci, Pranvera; Di Francesco, Mario; Aura, Tuomas2015 ISBN: 978-1-4673-8056-0Flexible Management of Cloud-Connected Digital Signage
Sethi, Mohit; Lijding, Maria; Di Francesco, Mario; Aura, Tuomas2015 ISBN: 978-1-4673-7211-4Electronic Citizen Identities and Strong Authentication
Suoranta, Sanna; Haataja, Lari; Aura, Tuomas2015 ISBN: 978-3-319-26501-8ISSN: 0302-9743Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch
Antikainen, Markku; Aura, Tuomas; Särelä, Mikko2014 ISBN: 978-3-319-11598-6Spatially aware malware infection modeling framework.
Kalliola, Aapo; Aura, Tuomas2014 Denial-of-Service Mitigation for Internet Services
Kalliola, Aapo; Aura, Tuomas; Šcepanovic, Sanja2014 ISBN: 978-3-319-11598-6MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies
Oat, Elena; Di Francesco, Mario; Aura, Tuomas2014 Commitment-based device pairing with synchronized drawing
Sethi, Mohit; Antikainen, Markku; Aura, Tuomas2014 Secure Bootstrapping of Cloud-Managed Ubiquitous Displays
Sethi, Mohit; Oat, Elena; Di Francesco, Mario; Aura, Tuomas2014 Logout in Single Sign-on Systems
Suoranta, Sanna; Tontti, Asko; Ruuskanen, Joonas; Aura, Tuomas2013 ISBN: 978-3-642-37281-0ISSN: 1868-4238Scaling Bloom filter based multicast with hierarchical tree splitting
Rizvi, Sajjad; Zahemszky, András; Aura, Tuomas2012 ISBN: 978-1-4577-2052-9ISSN: 1550-3607Strong Authentication with Mobile Phone
Suoranta, Sanna; Andrade, André; Aura, Tuomas2012 ISBN: 978-3-642-33382-8ISSN: 0302-9743Applicability Analysis of Grid Security Mechanisms on Cloud Networking
Khan, Rasib; Komu, Miika; Aura, Tuomas2011 ISBN: 978-1-4577-1635-5Performance Analysis of HIP Diet Exchange for WSN Security Establishment
Nie, Pin; Vähä-Herttua, Juho; Aura, Tuomas; Gurtov, Andrei2011 ISBN: 978-1-4503-0899-1Security Analysis of Leap-of-Faith Protocols
Pham, Viet; Aura, Tuomas2011 Forwarding Anomalies in Bloom Filter-based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, Andras; Nikander, Pekka; Ott, Jörg2011 in IEEE INFOCOM (ICST)ISBN: 978-1-4244-9921-2ISSN: 0743-166XHow to share your favourite search result while preserving privacy and quality
Danezis, George; Aura, Tuomas; Shuo, Chen; Kiciman, Emre2010 ISBN: 978-3-642-14526-1Can Hand-held Computers Still Be Better Smart Cards?
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka; Asokan, N.; Aura, Tuomas2010 Privacy-preserving 802.11 access-point discovery
Lindqvist, Janne; Aura, Tuomas; Danezis, George; Koponen, Teemu; Myllyniemi, Annu; Mäki, Jussi; Roe, Michael2009 ISBN: 978-1-60558-460-7Chattering Laptops
Aura, Tuomas; Lindqvist, Janne; Roe, Michael; Mohammed, Anish2008 ISBN: 978-3-540-70629-8Analysis of the HIP Base Exchagne Protocol
Aura, Tuomas; Nagarajan, Aarthi; Gurtov, Andrei2005 ISBN: 3-540-26547-3Towards a Survivable Security Architecture for Ad-Hoc Networks
Aura, Tuomas; Mäki, Silja2002 DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)
Aura, Tuomas2001 DOS-Resistant Authentication with Client Puzzles
Aura, Tuomas; Nikander, Pekka; Leiwo, Jussipekka2001 Analyzing single-server network inhibition
Aura, T.; Bishop, M.; Sniegowski, D.2000 Using conservation of flow as a security mechanism in network protocols
Hughes, J.; Aura, T.; Bishop, M.2000 Towards network denial of service resistant protocols
Leiwo, J.; Nikander, P.; Aura, T.2000 Robust Membership Management for Ad-hoc Groups
Mäki, S.; Aura, T.; Hietalahti, M.2000 Software license management with smart cards
Aura, T.; Gollmann, D.1999 On the structure of delegation networks
Aura, T.1998 Delegation-based access control for intelligent network services
Aura, T.; Koponen, P.; Räsänen, J.1998 Fast access control decisions from delegation certificate databases
Aura, T.1998 Stateless connections, in proceedings of International Conference on Information and Communications Security
Aura, Tuomas; Nikander, P.1997 Strategies against replay attacks
Aura, T.1997 Time processes of time Petri nets in proceedings
Aura, Tuomas; Lilius, J.1997 Comparison of graph-search algorithms for authorization verification in delegation networks
Aura, T.1997 Using multimodal logic to express conflicting interests in security protocols in proceedings of DIMACS Workshop on Design and formal verification of security protocols
Huima, Antti; Aura, T.1997 Practical invisiblity in digital communication
Aura, Tuomas1996 Non-refereed scientific articles
Unrefereed journal articlesSymbian OS Platform Security Model
Li, Bo; Reshetova, Elena; Aura, Tuomas2010 in ;login: The USENIX Magazine (Springer Verlag)Scientific books (monographs)
Book (editor)Information Security Technology for Applications, 15th Nordic Conference on Secure IT Systems, NordSec 2010, Aalto University, Finland, October 27-29, 2010, Revised Selected Papers
Aura, Tuomas; Järvinen, Kimmo; Nyberg, Kaisa2012 ISBN: 978-3-642-27936-2Publications intended for professional communities
Published development or research reportApplication of Public Ledgers to Revocation in Distributed Access Control
Bui, Tien; Aura, Tuomas2016 Forwarding Anomalies in Bloom Filter Based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, András; Nikander, Pekka; Ott, Jörg2010 Privacy and Accountability in Certificate Systems
Aura, T.; Ellison, C.2000 Authorization and Availability - Aspects of Open Network Security
Aura, T.2000 Stateless connections
Aura, T.; Nikander, P.1997 On the structure of delegation networks Licentiate's Thesis
Aura, T.1997 Time Processes of Time Petri Nets
Aura, T.1996 Modelling the Needham-Schröder Authentication Protocol with High Level Petri Nets
Aura, Tuomas1995
Commitment-based device-pairing protocol with synchronized drawings and comparison metrics
Denial-of-Service Attacks in Bloom-Filter-Based Forwarding
Adaptive and context-aware privacy preservation exploiting user interactions in smart environments
Logout in single sign-on systems: problems and solutions.
A causal semantics for time Petri nets
Distributed access-rights management with delegation certificates
Conference proceedingsA post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet
Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppanen, Ville2017 ISBN: 9781509028566An SDN-based approach to enhance the end-to-end security SSL/TLS case study
Ranjbar, Alireza; Komu, Miika; Salmela, Patrik; Aura, Tuomas2016 ISBN: 9781509002238Domain Isolation in a Multi-tenant Software-Defined Network
Ranjbar, Alireza; Antikainen, Markku; Aura, Tuomas2016 ISBN: 9780769556970We know where you are!
Rao, Siddharth Prakash; Oliver, Ian; Holtmanns, Silke; Aura, Tuomas2016 ISBN: 9789949954483Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs
Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppanen, Ville2016 ISBN: 978-1-4503-4781-5The Black Mark Beside My Name Server Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs
Ruohonen, Jukka; Scepanovic, Sanja; Hyrynsalmi, Sami; Mishkovski, Igor; Aura, Tuomas; Leppänen, Ville2016 ISBN: 9781509039463Flooding DDoS Mitigation and Traffic Management with Software Defined Networking
Kalliola, Aapo; Lee, Kiryong; Lee, Heejo; Aura, Tuomas2015 ISBN: 978-1-4673-9501-4Unblocking stolen mobile devices using SS7-MAP vulnerabilities Exploiting the relationship between IMEI and IMSI for EIR access
Rao, Siddharth Prakash; Holtmanns, Silke; Oliver, Ian; Aura, Tuomas2015 ISBN: 9781467379519Secure and Low-Power Authentication for Resource-Constrained Devices
Sethi, Mohit; Kortoci, Pranvera; Di Francesco, Mario; Aura, Tuomas2015 ISBN: 978-1-4673-8056-0Flexible Management of Cloud-Connected Digital Signage
Sethi, Mohit; Lijding, Maria; Di Francesco, Mario; Aura, Tuomas2015 ISBN: 978-1-4673-7211-4Electronic Citizen Identities and Strong Authentication
Suoranta, Sanna; Haataja, Lari; Aura, Tuomas2015 ISBN: 978-3-319-26501-8ISSN: 0302-9743Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch
Antikainen, Markku; Aura, Tuomas; Särelä, Mikko2014 ISBN: 978-3-319-11598-6Spatially aware malware infection modeling framework.
Kalliola, Aapo; Aura, Tuomas2014 Denial-of-Service Mitigation for Internet Services
Kalliola, Aapo; Aura, Tuomas; Šcepanovic, Sanja2014 ISBN: 978-3-319-11598-6MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies
Oat, Elena; Di Francesco, Mario; Aura, Tuomas2014 Commitment-based device pairing with synchronized drawing
Sethi, Mohit; Antikainen, Markku; Aura, Tuomas2014 Secure Bootstrapping of Cloud-Managed Ubiquitous Displays
Sethi, Mohit; Oat, Elena; Di Francesco, Mario; Aura, Tuomas2014 Logout in Single Sign-on Systems
Suoranta, Sanna; Tontti, Asko; Ruuskanen, Joonas; Aura, Tuomas2013 ISBN: 978-3-642-37281-0ISSN: 1868-4238Scaling Bloom filter based multicast with hierarchical tree splitting
Rizvi, Sajjad; Zahemszky, András; Aura, Tuomas2012 ISBN: 978-1-4577-2052-9ISSN: 1550-3607Strong Authentication with Mobile Phone
Suoranta, Sanna; Andrade, André; Aura, Tuomas2012 ISBN: 978-3-642-33382-8ISSN: 0302-9743Applicability Analysis of Grid Security Mechanisms on Cloud Networking
Khan, Rasib; Komu, Miika; Aura, Tuomas2011 ISBN: 978-1-4577-1635-5Performance Analysis of HIP Diet Exchange for WSN Security Establishment
Nie, Pin; Vähä-Herttua, Juho; Aura, Tuomas; Gurtov, Andrei2011 ISBN: 978-1-4503-0899-1Security Analysis of Leap-of-Faith Protocols
Pham, Viet; Aura, Tuomas2011 Forwarding Anomalies in Bloom Filter-based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, Andras; Nikander, Pekka; Ott, Jörg2011 in IEEE INFOCOM (ICST)ISBN: 978-1-4244-9921-2ISSN: 0743-166XHow to share your favourite search result while preserving privacy and quality
Danezis, George; Aura, Tuomas; Shuo, Chen; Kiciman, Emre2010 ISBN: 978-3-642-14526-1Can Hand-held Computers Still Be Better Smart Cards?
Tamrakar, Sandeep; Ekberg, Jan-Erik; Laitinen, Pekka; Asokan, N.; Aura, Tuomas2010 Privacy-preserving 802.11 access-point discovery
Lindqvist, Janne; Aura, Tuomas; Danezis, George; Koponen, Teemu; Myllyniemi, Annu; Mäki, Jussi; Roe, Michael2009 ISBN: 978-1-60558-460-7Chattering Laptops
Aura, Tuomas; Lindqvist, Janne; Roe, Michael; Mohammed, Anish2008 ISBN: 978-3-540-70629-8Analysis of the HIP Base Exchagne Protocol
Aura, Tuomas; Nagarajan, Aarthi; Gurtov, Andrei2005 ISBN: 3-540-26547-3Towards a Survivable Security Architecture for Ad-Hoc Networks
Aura, Tuomas; Mäki, Silja2002 DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)
Aura, Tuomas2001 DOS-Resistant Authentication with Client Puzzles
Aura, Tuomas; Nikander, Pekka; Leiwo, Jussipekka2001 Analyzing single-server network inhibition
Aura, T.; Bishop, M.; Sniegowski, D.2000 Using conservation of flow as a security mechanism in network protocols
Hughes, J.; Aura, T.; Bishop, M.2000 Towards network denial of service resistant protocols
Leiwo, J.; Nikander, P.; Aura, T.2000 Robust Membership Management for Ad-hoc Groups
Mäki, S.; Aura, T.; Hietalahti, M.2000 Software license management with smart cards
Aura, T.; Gollmann, D.1999 On the structure of delegation networks
Aura, T.1998 Delegation-based access control for intelligent network services
Aura, T.; Koponen, P.; Räsänen, J.1998 Fast access control decisions from delegation certificate databases
Aura, T.1998 Stateless connections, in proceedings of International Conference on Information and Communications Security
Aura, Tuomas; Nikander, P.1997 Strategies against replay attacks
Aura, T.1997 Time processes of time Petri nets in proceedings
Aura, Tuomas; Lilius, J.1997 Comparison of graph-search algorithms for authorization verification in delegation networks
Aura, T.1997 Using multimodal logic to express conflicting interests in security protocols in proceedings of DIMACS Workshop on Design and formal verification of security protocols
Huima, Antti; Aura, T.1997 Practical invisiblity in digital communication
Aura, Tuomas1996 Non-refereed scientific articles
Unrefereed journal articlesSymbian OS Platform Security Model
Li, Bo; Reshetova, Elena; Aura, Tuomas2010 in ;login: The USENIX Magazine (Springer Verlag)Scientific books (monographs)
Book (editor)Information Security Technology for Applications, 15th Nordic Conference on Secure IT Systems, NordSec 2010, Aalto University, Finland, October 27-29, 2010, Revised Selected Papers
Aura, Tuomas; Järvinen, Kimmo; Nyberg, Kaisa2012 ISBN: 978-3-642-27936-2Publications intended for professional communities
Published development or research reportApplication of Public Ledgers to Revocation in Distributed Access Control
Bui, Tien; Aura, Tuomas2016 Forwarding Anomalies in Bloom Filter Based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, András; Nikander, Pekka; Ott, Jörg2010 Privacy and Accountability in Certificate Systems
Aura, T.; Ellison, C.2000 Authorization and Availability - Aspects of Open Network Security
Aura, T.2000 Stateless connections
Aura, T.; Nikander, P.1997 On the structure of delegation networks Licentiate's Thesis
Aura, T.1997 Time Processes of Time Petri Nets
Aura, T.1996 Modelling the Needham-Schröder Authentication Protocol with High Level Petri Nets
Aura, Tuomas1995
A post-mortem empirical investigation of the popularity and distribution of malware files in the contemporary web-facing internet
An SDN-based approach to enhance the end-to-end security SSL/TLS case study
Domain Isolation in a Multi-tenant Software-Defined Network
We know where you are!
Correlating File-based Malware Graphs Against the Empirical Ground Truth of DNS Graphs
The Black Mark Beside My Name Server Exploring the Importance of Name Server IP Addresses in Malware DNS Graphs
Flooding DDoS Mitigation and Traffic Management with Software Defined Networking
Unblocking stolen mobile devices using SS7-MAP vulnerabilities Exploiting the relationship between IMEI and IMSI for EIR access
Secure and Low-Power Authentication for Resource-Constrained Devices
Flexible Management of Cloud-Connected Digital Signage
Electronic Citizen Identities and Strong Authentication
Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch
Spatially aware malware infection modeling framework.
Denial-of-Service Mitigation for Internet Services
MoCHA: Augmenting Pervasive Displays through Mobile Devices and Web-based Technologies
Commitment-based device pairing with synchronized drawing
Secure Bootstrapping of Cloud-Managed Ubiquitous Displays
Logout in Single Sign-on Systems
Scaling Bloom filter based multicast with hierarchical tree splitting
Strong Authentication with Mobile Phone
Applicability Analysis of Grid Security Mechanisms on Cloud Networking
Performance Analysis of HIP Diet Exchange for WSN Security Establishment
Security Analysis of Leap-of-Faith Protocols
Forwarding Anomalies in Bloom Filter-based Multicast
How to share your favourite search result while preserving privacy and quality
Can Hand-held Computers Still Be Better Smart Cards?
Privacy-preserving 802.11 access-point discovery
Chattering Laptops
Analysis of the HIP Base Exchagne Protocol
Towards a Survivable Security Architecture for Ad-Hoc Networks
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)
DOS-Resistant Authentication with Client Puzzles
Analyzing single-server network inhibition
Using conservation of flow as a security mechanism in network protocols
Towards network denial of service resistant protocols
Robust Membership Management for Ad-hoc Groups
Software license management with smart cards
On the structure of delegation networks
Delegation-based access control for intelligent network services
Fast access control decisions from delegation certificate databases
Stateless connections, in proceedings of International Conference on Information and Communications Security
Strategies against replay attacks
Time processes of time Petri nets in proceedings
Comparison of graph-search algorithms for authorization verification in delegation networks
Using multimodal logic to express conflicting interests in security protocols in proceedings of DIMACS Workshop on Design and formal verification of security protocols
Practical invisiblity in digital communication
Symbian OS Platform Security Model
Scientific books (monographs)
Book (editor)Information Security Technology for Applications, 15th Nordic Conference on Secure IT Systems, NordSec 2010, Aalto University, Finland, October 27-29, 2010, Revised Selected Papers
Aura, Tuomas; Järvinen, Kimmo; Nyberg, Kaisa2012 ISBN: 978-3-642-27936-2Publications intended for professional communities
Published development or research reportApplication of Public Ledgers to Revocation in Distributed Access Control
Bui, Tien; Aura, Tuomas2016 Forwarding Anomalies in Bloom Filter Based Multicast
Särelä, Mikko; Rothenberg, Christian Esteve; Aura, Tuomas; Zahemszky, András; Nikander, Pekka; Ott, Jörg2010 Privacy and Accountability in Certificate Systems
Aura, T.; Ellison, C.2000 Authorization and Availability - Aspects of Open Network Security
Aura, T.2000 Stateless connections
Aura, T.; Nikander, P.1997 On the structure of delegation networks Licentiate's Thesis
Aura, T.1997 Time Processes of Time Petri Nets
Aura, T.1996 Modelling the Needham-Schröder Authentication Protocol with High Level Petri Nets
Aura, Tuomas1995
Information Security Technology for Applications, 15th Nordic Conference on Secure IT Systems, NordSec 2010, Aalto University, Finland, October 27-29, 2010, Revised Selected Papers
Application of Public Ledgers to Revocation in Distributed Access Control
Forwarding Anomalies in Bloom Filter Based Multicast
Privacy and Accountability in Certificate Systems
Authorization and Availability - Aspects of Open Network Security
Stateless connections
On the structure of delegation networks Licentiate's Thesis
Time Processes of Time Petri Nets
Modelling the Needham-Schröder Authentication Protocol with High Level Petri Nets
Read about executive education
Other experts
Rachel Aleks
Overview Rachel Aleks joined the School of Industrial and Labor Relations in 2014 as an Assistant Professor of Labor Relations. She earned her Ph.D. in Industrial Relations and Human Resources from the University of Toronto in 2014 and her B.Com in International Management from McGill University ...
Looking for an expert?
Contact us and we'll find the best option for you.