Author of the publication

Programming Model Perspective on Security and Privacy of Social Cyber-physical Systems.

, , , and . IEEE MS, page 87-94. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kannisto, Joona
add a person with the name Kannisto, Joona
 

Other publications of authors with the same name

A non-repudiable negotiation protocol for security service level agreements., , , , , , and . Int. J. Communication Systems, 28 (15): 2067-2081 (2015)Tailored Security: Building Nonrepudiable Security Service-Level Agreements., , , , and . CoRR, (2014)Accountable security mechanism based on security service level agreement., , , , , , and . ISCC, page 404-410. IEEE Computer Society, (2013)Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things., , , , , and . IEEE Internet of Things Journal, 4 (4): 843-854 (2017)Safe, Secure Executions at the Network Edge: Coordinating Cloud, Edge, and Fog Computing., , , , , and . IEEE Software, 35 (1): 30-37 (2018)Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet., , and . AsiaJCIS, page 55-59. IEEE, (2016)Programming Model Perspective on Security and Privacy of Social Cyber-physical Systems., , , and . IEEE MS, page 87-94. IEEE Computer Society, (2016)The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication., and . NSS, volume 10394 of Lecture Notes in Computer Science, page 301-314. Springer, (2017)Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme., , , , , and . SERVICES, page 121-128. IEEE Computer Society, (2014)Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlays., , and . AsiaJCIS, page 17-23. IEEE, (2016)