Philip Ginzboorg
Professor of Practice
Professor of Practice
T313 Dept. Computer Science
Full researcher profile
https://research.aalto.fi/...
E-post
[email protected]
Telefonnummer
+358504836224
Publikationer
Authentication of fragments with short tags
Philip Ginzboorg, Valtteri Niemi, Jörg Ott
2024
Theoretical Computer Science
Attestation with Constrained Relying Party
Mariam Moustafa, Arto Niemi, Philip Ginzboorg, Jan Erik Ekberg
2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy
Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility
Gizem Akman, Philip Ginzboorg, Mohamed Taoufiq Damir, Valtteri Niemi
2023
Computers
Split keys for station-to-station (STS) protocols
Gizem Akman, Mohamed Taoufiq Damir, Philip Ginzboorg, Sampo Sovio, Valtteri Niemi
2023
Journal of Surveillance, Security and Safety
AKMA for Secure Multi-access Edge Computing Mobility in 5G
Gizem Akman, Philip Ginzboorg, Valtteri Niemi
2022
Computational Science and Its Applications- ICCSA 2022 Workshops, Proceedings
Privacy-Aware Access Protocols for MEC Applications in 5G
Gizem Akman, Philip Ginzboorg, Valtteri Niemi
2022
Network
Trusted Hart for Mobile RISC-V Security
V. Ushakov, S. Sovio, Q. Qi, V. Nayani, V. Manea, P. Ginzboorg, J. E. Ekberg
2022
Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022
Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications
Gizem Akman, Philip Ginzboorg, Valtteri Niemi
2021
Computational Science and Its Applications – ICCSA 2021
Credential Provisioning and Device Configuration with EAP
Sebastien Boire, Tolgahan Akgün, Philip Ginzboorg, Pekka Laitinen, Sandeep Tamrakar, Tuomas Aura
2021
MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access
AKMA: Delegated Authentication System of 5G
Mohsin Khan, Philip Ginzboorg, Valtteri Niemi
2021
IEEE Communications Standards Magazine
AKMA Support in Multi SIM User Equipment
Gizem Akman, Valtteri Niemi, Philip Ginzboorg
2019
Proceedings of the 25th Conference of Open Innovations Association FRUCT, FRUCT 2019
Privacy preserving AKMA in 5G
Mohsin Khan, Philip Ginzboorg, Valtteri Niemi
2019
SSR 2019 - Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop
Estimating Message Transmission Time over Heterogeneous Disrupted Links
Philip Ginzboorg, Valtteri Niemi, Jorg Ott
2018
2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018
Defeating the downgrade attack on identity privacy in 5G
Mohsin Khan, Philip Ginzboorg, Kimmo Järvinen, Valtteri Niemi
2018
Security Standardisation Research - 4th International Conference, SSR 2018, Proceedings
IMSI-based Routing and Identity Privacy in 5G
Mohsin Khan, Valtteri Niemi, Philip Ginzboorg
2018
FRUCT'22: Proceedings of the 22st Conference of Open Innovations Association FRUCT
On estimating the alphabet size of a discrete random source
Philip Ginzboorg
2017
On De-synchronization of User Pseudonyms in Mobile Networks
Mohsin Khan, Kimmo Järvinen, Philip Ginzboorg, Valtteri Niemi
2017
Information Systems Security. ICISS 2017
Privacy of the Long-Term Identities in Cellular Networks
Philip Ginzboorg, Valtteri Niemi
2016
2nd International Workshop on 5G Security (IW5GS 2016), 19 June 2016, Xi'an, China
From the rigid hierarchical to flexible flow-based 5G architecture: dimensioning issues
Andrey Krendzel, Philip Ginzboorg
2015
The 6th International Conference On Network of the Future (NoF 2015), Montreal, QC, Canada, Sep. 30 Oct. 2, 2015
Message Fragmentation for a Chain of Disrupted Links.
Philip Ginzboorg, Valtteri Niemi, Jörg Ott
2014
Computer Communications
Security mechanisms in partially isolated networks
Philip Ginzboorg
2014
Expected Penetration Rate of 5G Mobile Users by 2020: A Case Study
Andrey Krendzel, Philip Ginzboorg
2014
The Fourth International Conference on Mobile Services, Resources, and Users. MOBILITY 2014: July 20-24, 2014, Paris, France
Inferring Social Ties in Academic Networks Using Short-Range Wireless Communication
Igor Bilogrevic, Kevin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi
2013
ACM Workshop on Privacy in the Electronic Society (WPES), Berlin, Germany, November 4 2013
Fragmentation algorithms for DTN links
Philip Ginzboorg, Valtteri Niemi, Jörg Ott
2013
Computer Communications
Big Brother Knows Your Friends: on Privacy of Social Communities in Pervasive Networks
Igor Bilogrevic, Murtuza Jadliwala, Istvan Lam, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Laurent Bindschaedler, Jean-Pierre Hubaux
2012
10th International Conference on Pervasive Computing (PERVASIVE 2012), Newcastle, UK,June 18-22, 2012
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks
Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux
2012
19th Annual Network & Distributed System Security Symposium (NDSS 2012), San Diego, USA, 5-8 February 2012
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks
Julien Freudiger, Murtuza Jadliwala, Jean-Pierre Hubaux, Valtteri Niemi, Philip Ginzboorg
2012
Mobile Networks and Applications
Message fragmentation for a chain of disrupted links
Philip Ginzboorg, Valtteri Niemi, Jörg Ott
2012
IEEE WoWMoM workshop on Autonomous and Opportunistic Communication (AOC), San Francisco, California, USA June 25-28, 2012
Nokia Instant Community at EPFL: a real-world large-scale wireless peer-to-peer trial
Imad Aad, Murtuza Jadliwala, Igor Bilogrevic, Valtteri Niemi, Jean-Pierre Hubaux, Philip Ginzboorg, Kari Leppänen
2011
Message Fragmentation for Disrupted Links
Philip Ginzboorg, Valtteri Niemi, Jörg Ott
2011
EW 17th European Wireless Conference, Vienna, Austria, April 27-29, 2011
Best-effort authentication for opportunistic networks
J. Solis, P. Ginzboorg, N. Asokan, J. Ott
2011
IPCCC 30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011, Orlando, FL, 17 November 2011 - 19 November 2011
DTM Communication in a Mine
Philip Ginzboorg, Teemu Kärkkäinen, Aki Ruotsalainen, Mikael Andersson, Jörg Ott
2010
2nd Extreme Workshop on Communications Dharamsala, India, 4-10 September, 2010
DTN Communication in a Mine
Philip Ginzboorg, Teemu Kärkkäinen, Aki Ruotsalainen, Mikael Andersson, Jörg Ott
2010
2nd Extreme Workshop on Communication (ExtremeCom)
Reachability in restricted walk on integers
Philip Ginzboorg, Valtteri Niemi
2010
Journal of Universal Computer Science
Controlling Resource Hogs in Mobile Delay-tolerant Networks
John Solis, Nadarajah Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott
2010
Computer Communications
Cellular Authentication for Mobile and Internet Services
Silke Holtmanns, Valtteri Niemi, Philip Ginzboorg, Pekka Laitinen, N. Asokan
2008
Applicability of identity-based cryptography for disruption-tolerant networking
N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo
2007
MobiOpp'07
Towards Securing Disruption-Tolerant Networking
N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo
2007
Framework for com parative usability testing for distributed applications
Kari Kostiainen, N. Asokan, Ersin Uzun, Philip Ginzboorg
2007
Visitor access management in personal wireless networks
N. Asokan, Seamus Moloney, Philip Ginzboorg, Kari Kostiainen
2005
Proceedings - Seventh IEEE International Symposium on Multimedia, ISM 2005
Extending cellular authentication as a service
P. Laitinen, P. Ginzboorg, N. Asokan, S. Holtmanns, V. Niemi
2005
1st IEE International Conference on Commercialising Technology and Innovation
Security for interactions in pervasive networks
Seamus Moloney, Philip Ginzboorg
2005
Security in Ad-hoc and Sensor Networks
Key agreement in ad hoc networks
N. Asokan, P. Ginzboorg
2000
Computer Communications
Seven comments on charging and billing
Philip Ginzboorg
2000
Communications of the ACM
Charging for broadband access
Philip Ginzboorg, Jan-Erik Ekberg, Pekka Laitinen, Antti Ylä-Jääski
1998
1st International Conference on Telecommunications and Electronic Commerce (ICTEC)
Lowpass traffic policing mechanism based on the leaky bucket
P. Ginzboorg, P. Grönberg
1998
Electronics Letters
Methods to synchronize the IN SCP’s overload protection mechanism
Philip Ginzboorg
1996
Intelligent Networks and Intelligence in Networks