A comprehensive formal analysis of 5G handover A Peltonen, R Sasse, D Basin Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 53 | 2021 |
Misbinding attacks on secure device pairing and bootstrapping M Sethi, A Peltonen, T Aura Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 31 | 2019 |
Nimble out-of-band authentication for EAP (EAP-NOOB) T Aura, M Sethi, A Peltonen | 28 | 2021 |
Security Analysis of the Consumer Remote SIM Provisioning Protocol AS Ahmed, A Peltonen, M Sethi, T Aura ACM Transactions on Privacy and Security, 2024 | 6 | 2024 |
Formal verification of misbinding attacks on secure device pairing and bootstrapping A Peltonen, M Sethi, T Aura Journal of Information Security and Applications 51, 102461, 2020 | 6 | 2020 |
Exploring How Students Solve Open-ended Assignments: A Study of SQL Injection Attempts in a Cybersecurity Course C Koutcheme, A Tilanterä, A Peltonen, A Hellas, L Haaranen Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022 | 3 | 2022 |
Enterprise Security for the Internet of Things (IoT): Lightweight Bootstrapping with EAP-NOOB A Peltonen, E Inglés, S Latvala, D Garcia-Carrillo, M Sethi, T Aura Sensors 20 (21), 6101, 2020 | 3 | 2020 |
Formal Modelling and Verification of the EAP-NOOB Protocol A Peltonen | 3 | 2018 |
An Extended Hierarchy of Security Notions for Threshold Signature Schemes and Automated Analysis of Protocols That Use Them C Cremers, A Peltonen, M Zhao Cryptology ePrint Archive, 2024 | 2 | 2024 |
Formal Verification and Standardization of Security Protocols A Peltonen Aalto University, 2023 | | 2023 |