Follow
Kimmo Halunen
Kimmo Halunen
Professor of Cybersecurity, University of Oulu and National Defence University of Finland
Verified email at oulu.fi
Title
Cited by
Cited by
Year
Experiences with Model Inference Assisted Fuzzing.
J Viide, A Helin, M Laakso, P Pietikäinen, M Seppänen, K Halunen, ...
WOOT 2, 1-2, 2008
482008
Smart contracts for a mobility-as-a-service ecosystem
A Karinsalo, K Halunen
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
432018
Detecting man-in-the-middle attacks on non-mobile systems
VA Vallivaara, M Sailio, K Halunen
Proceedings of the 4th ACM conference on Data and application security and …, 2014
342014
Evaluation of user authentication methods in the gadget-free world
K Halunen, J Häikiö, V Vallivaara
Pervasive and Mobile Computing 40, 220-241, 2017
312017
Evaluating the Efficiency of Blockchains in IoT with Simulations.
J Kreku, VA Vallivaara, K Halunen, J Suomalainen, M Ramachandran, ...
IoTBDS, 216-223, 2017
212017
Review of the use of human senses and capabilities in cryptography
K Halunen, OM Latvala
Computer Science Review 39, 100340, 2021
192021
Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis: (Short Paper)
T Schaberreiter, K Kittilä, K Halunen, J Röning, D Khadraoui
Critical Information Infrastructure Security: 6th International Workshop …, 2013
142013
Implementing post-quantum cryptography for developers
J Hekkala, M Muurman, K Halunen, V Vallivaara
SN Computer Science 4 (4), 365, 2023
132023
Multicollision attacks and generalized iterated hash functions
J Kortelainen, K Halunen, T Kortelainen
Journal of Mathematical Cryptology 4 (3), 239-270, 2010
122010
Software vulnerability vs. critical infrastructure-a case study of antivirus software
J Eronen, K Karjalainen, R Puuperä, E Kuusela, K Halunen, M Laakso, ...
International Journal on Advances in Security 2 (1), 2009
122009
n-auth: Mobile authentication done right
R Peeters, J Hermans, P Maene, K Grenman, K Halunen, J Häikiö
Proceedings of the 33rd Annual Computer Security Applications Conference, 1-15, 2017
112017
Digi-HTA, assessment framework for digital healthcare services: information security and data protection in health technology–initial experiences
J Jääskelä, J Haverinen, R Kaksonen, J Reponen, K Halunen, T Tokola, ...
Finnish Journal of eHealth and eWelfare 14 (1), 19-30, 2022
102022
On the Similarities between Blockchains and Merkle-Damgård Hash Functions
K Halunen, V Vallivaara, A Karinsalo
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
102018
A generic multimodels-based approach for the analysis of usability and security of authentication mechanisms
N Broders, C Martinie, P Palanque, M Winckler, K Halunen
Human-Centered Software Engineering: 8th IFIP WG 13.2 International Working …, 2020
82020
Secure, usable and privacy-friendly user authentication from keystroke dynamics
K Halunen, V Vallivaara
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
82016
Common cybersecurity requirements in IoT standards, best practices, and guidelines
R Kaksonen, K Halunen, J Röning
Proceedings of the 7th International Conference on Internet of Things, Big …, 2022
72022
CryptoVault-A Secure Hardware Wallet for Decentralized Key Management
N Lehto, K Halunen, OM Latvala, A Karinsalo, J Salonen
2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS …, 2021
72021
" Speak, Friend, and Enter"-Secure, Spoken One-Time Password Authentication
OM Latvala, C Peng, P Honkamaa, K Halunen
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
72018
Context-aware systems and adaptive user authentication
K Halunen, A Evesti
Evolving Ambient Intelligence: AmI 2013 Workshops, Dublin, Ireland, December …, 2013
72013
Vulnerability dependencies in antivirus software
K Askola, R Puuperä, P Pietikäinen, J Eronen, M Laakso, K Halunen, ...
2008 Second International Conference on Emerging Security Information …, 2008
72008
The system can't perform the operation now. Try again later.
Articles 1–20