Follow
Joona Kannisto
Title
Cited by
Cited by
Year
Safe, secure executions at the network edge: coordinating cloud, edge, and fog computing
N Mäkitalo, A Ometov, J Kannisto, S Andreev, Y Koucheryavy, T Mikkonen
IEEE Software 35 (1), 30-37, 2017
79*2017
Facilitating the delegation of use for private devices in the era of the internet of wearable things
A Ometov, SV Bezzateev, J Kannisto, J Harju, S Andreev, Y Koucheryavy
IEEE Internet of Things Journal 4 (4), 843-854, 2016
712016
Tailored security: Building nonrepudiable security service-level agreements
T Takahashi, J Kannisto, J Harju, S Heikkinen, B Silverajan, M Helenius, ...
IEEE Vehicular Technology Magazine 8 (3), 54-62, 2013
182013
IPsec and IKE as functions in SDN controlled network
M Vajaranta, J Kannisto, J Harju
Network and System Security: 11th International Conference, NSS 2017 …, 2017
82017
Implementation experiences and design challenges for resilient SDN based secure WAN overlays
M Vajaranta, J Kannisto, J Harju
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 17-23, 2016
82016
Programming model perspective on security and privacy of social cyber-physical systems
J Kannisto, N Mäkitalo, T Aaltonen, T Mikkonen
2016 IEEE International Conference on Mobile Services (MS), 87-94, 2016
62016
Network application function registration
P Salmela, J Kannisto, M Sethi, K Slavov
US Patent 11,252,572, 2022
42022
The time will tell on you: Exploring information leaks in ssh public key authentication
J Kannisto, J Harju
Network and System Security: 11th International Conference, NSS 2017 …, 2017
42017
A non‐repudiable negotiation protocol for security service level agreements
J Kannisto, T Takahashi, J Harju, S Heikkinen, M Helenius, S Matsuo, ...
International Journal of Communication Systems 28 (15), 2067-2081, 2015
42015
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme
T Takahashi, J Kannisto, J Harju, A Kanaoka, Y Takano, S Matsuo
2014 IEEE World Congress on Services, 121-128, 2014
32014
Observing hidden service directory spying with a private hidden service honeynet
J Nurmi, J Kannisto, M Vajaranta
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 55-59, 2016
22016
Accountable security mechanism based on security service level agreement
T Takahashi, J Kannisto, J Harju, S Heikkinen, M Helenius, S Matsuo, ...
2013 IEEE Symposium on Computers and Communications (ISCC), 000404-000410, 2013
22013
Cloud software Program: Best Practices for Cloud Computing
J Ahola, A Ashfar, B Gupta, U Hassan, M Hartikainen, M Helenius, ...
Tieto-ja viestintäteollisuuden tutkimus TIVIT Oy, 2010
12010
Delayed Key Exchange for Constrained Smart Devices
J Kannisto, S Heikkinen, K Slavov, J Harju
Ad-hoc Networks and Wireless: ADHOC-NOW 2014 International Workshops, ETSD …, 2015
2015
Location Sharing Patterns of Parents and Their Children
M Helenius, J Kannisto, H Kiljander, V Nore
Internet of Things Finland, 19-21, 2014
2014
Digital Identities and Accountable Agreements in Web Applications
J Kannisto, J Harju, T Takahashi
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
2014
Android Security Software Needs More Privileges
J Kannisto, M Helenius
Proceedings of SQM and INSPIRE 2012, August 21-23, 2012, Tampere, Finland, 49-59, 2012
2012
Heuristic Evaluation of Security Product User Experience
J Kannisto, M Helenius
Proceedings of SQM and INSPIRE 2012, August 21-23, 2012, Tampere, Finland, 22-35, 2012
2012
ReputationPlugin Reputation Based Trust Management Plugin for TWiki, Available as open source License GPLv2
J Kannisto, M Helenius, P Thoeny, F Morris, C Currie, S Dowideit, ...
2011
Reputation Based Trust Management in a Wiki Environment
J Kannisto
2011
The system can't perform the operation now. Try again later.
Articles 1–20