Follow
Mikko Kiviharju
Mikko Kiviharju
Research manager, FDRA
Verified email at mil.fi
Title
Cited by
Cited by
Year
On the fog of RSA key lengths: Verifying public key cryptography strength recommendations
M Kiviharju
2017 International Conference on Military Communications and Information …, 2017
152017
Towards modelling information security with key-challenge Petri nets
M Kiviharju, T Venäläinen, S Kinnunen
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure …, 2009
122009
A roadmap towards content based information security
C Candolin, M Kiviharju
ECIW2008-7th European Conference on Information Warfare and Security …, 2008
82008
Towards Pervasive Cryptographic Access Control Models.
M Kiviharju
SECRYPT, 239-244, 2012
72012
Tactical cac profile for nato olp? performance estimations for nato olp cryptographic evolution stage
M Kiviharju, A Kurnikov
MILCOM 2016-2016 IEEE Military Communications Conference, 533-538, 2016
52016
Attribute pooling for Cryptographic Access Control
M Kiviharju
2015 International Conference on Military Communications and Information …, 2015
52015
A taxonomy of metrics for cryptographic systems
K Halunen, J Suomalainen, OM Latvala, M Kylänpää, V Vallivaara, ...
Thirteenth International Conference on Emerging Security Information …, 2019
42019
A cryptographic and key management glance at cybersecurity challenges of the future European railway system
M Kiviharju, C Lassfolk, S Rikkonen, H Kari
2022 14th International Conference on Cyber Conflict: Keep Moving!(CyCon …, 2022
32022
Enforcing Role-Based Access Control with Attribute-Based Cryptography in MLS Environments
M Kiviharju
Publications of the Finnish Defence Research Agency 8, 2017
32017
Finnish View on the Combat Functions in the Cyber Domain
M Kiviharju, M Huttunen, H Kantola
Proceedings of the 19th European Conference on Cyber Warfare and Security. A …, 2020
22020
Enforcing Role-Based Access Control with Attribute-Based Cryptography for Environments with Multi-Level Security Requirements
M Kiviharju
Aalto University, 2016
22016
Rbac with abs: Implementation practicalities for rbac integrity policies
M Kiviharju
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-10, 2014
22014
Cryptographic key management architectures for environments with independent subdomains
M Kiviharju
22008
Refining Mosca’s Theorem: Risk Management Model for the Quantum Threat Applied to IoT Protocol Security
M Kiviharju
Cyber Security: Critical Infrastructure Protection, 369-401, 2022
12022
Applicability of a Cryptographic Metric Taxonomy in Cryptosystem Procurement Process and in Evaluation of Open Standards
OM Latvala, J Suomalainen, K Halunen, M Kylänpää, R Savola, ...
International Journal on Advances in Security 13 (3&4), 121-135, 2020
12020
Cryptographic Roles in the Age of Wikileaks: Implementation Models for Cryptographically Enforced RBAC
M Kiviharju
MILCOM 2013-2013 IEEE Military Communications Conference, 1779-1788, 2013
12013
On the Cyber Security of Logistics in the Age of Artificial Intelligence
M Kiviharju
Artificial Intelligence For Security-Enhancing Protection in a Changing World, 2023
2023
Telegrams on Negotiations on Capturing Petrograd, 1919
S Potka, M Kiviharju
International Conference on Historical Cryptology, 168-171, 2022
2022
Turning the Asymmetry Around: Tactical Principles of Warfare in the Cyber Domain
M Kiviharju, M Huttunen
ECCWS 2020 19th European Conference on Cyber Warfare and Security, 177, 2020
2020
On Multi-Level Secure structured content: A cryptographic key management—Independent XML schema for MLS content
M Kiviharju
2012 Military Communications and Information Systems Conference (MCC), 1-8, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20