On the fog of RSA key lengths: Verifying public key cryptography strength recommendations M Kiviharju 2017 International Conference on Military Communications and Information …, 2017 | 15 | 2017 |
Towards modelling information security with key-challenge Petri nets M Kiviharju, T Venäläinen, S Kinnunen Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure …, 2009 | 12 | 2009 |
A roadmap towards content based information security C Candolin, M Kiviharju ECIW2008-7th European Conference on Information Warfare and Security …, 2008 | 8 | 2008 |
Towards Pervasive Cryptographic Access Control Models. M Kiviharju SECRYPT, 239-244, 2012 | 7 | 2012 |
Tactical cac profile for nato olp? performance estimations for nato olp cryptographic evolution stage M Kiviharju, A Kurnikov MILCOM 2016-2016 IEEE Military Communications Conference, 533-538, 2016 | 5 | 2016 |
Attribute pooling for Cryptographic Access Control M Kiviharju 2015 International Conference on Military Communications and Information …, 2015 | 5 | 2015 |
A taxonomy of metrics for cryptographic systems K Halunen, J Suomalainen, OM Latvala, M Kylänpää, V Vallivaara, ... Thirteenth International Conference on Emerging Security Information …, 2019 | 4 | 2019 |
A cryptographic and key management glance at cybersecurity challenges of the future European railway system M Kiviharju, C Lassfolk, S Rikkonen, H Kari 2022 14th International Conference on Cyber Conflict: Keep Moving!(CyCon …, 2022 | 3 | 2022 |
Enforcing Role-Based Access Control with Attribute-Based Cryptography in MLS Environments M Kiviharju Publications of the Finnish Defence Research Agency 8, 2017 | 3 | 2017 |
Finnish View on the Combat Functions in the Cyber Domain M Kiviharju, M Huttunen, H Kantola Proceedings of the 19th European Conference on Cyber Warfare and Security. A …, 2020 | 2 | 2020 |
Enforcing Role-Based Access Control with Attribute-Based Cryptography for Environments with Multi-Level Security Requirements M Kiviharju Aalto University, 2016 | 2 | 2016 |
Rbac with abs: Implementation practicalities for rbac integrity policies M Kiviharju 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-10, 2014 | 2 | 2014 |
Cryptographic key management architectures for environments with independent subdomains M Kiviharju | 2 | 2008 |
Refining Mosca’s Theorem: Risk Management Model for the Quantum Threat Applied to IoT Protocol Security M Kiviharju Cyber Security: Critical Infrastructure Protection, 369-401, 2022 | 1 | 2022 |
Applicability of a Cryptographic Metric Taxonomy in Cryptosystem Procurement Process and in Evaluation of Open Standards OM Latvala, J Suomalainen, K Halunen, M Kylänpää, R Savola, ... International Journal on Advances in Security 13 (3&4), 121-135, 2020 | 1 | 2020 |
Cryptographic Roles in the Age of Wikileaks: Implementation Models for Cryptographically Enforced RBAC M Kiviharju MILCOM 2013-2013 IEEE Military Communications Conference, 1779-1788, 2013 | 1 | 2013 |
On the Cyber Security of Logistics in the Age of Artificial Intelligence M Kiviharju Artificial Intelligence For Security-Enhancing Protection in a Changing World, 2023 | | 2023 |
Telegrams on Negotiations on Capturing Petrograd, 1919 S Potka, M Kiviharju International Conference on Historical Cryptology, 168-171, 2022 | | 2022 |
Turning the Asymmetry Around: Tactical Principles of Warfare in the Cyber Domain M Kiviharju, M Huttunen ECCWS 2020 19th European Conference on Cyber Warfare and Security, 177, 2020 | | 2020 |
On Multi-Level Secure structured content: A cryptographic key management—Independent XML schema for MLS content M Kiviharju 2012 Military Communications and Information Systems Conference (MCC), 1-8, 2012 | | 2012 |