A. Lukyanenko, A. Gurtov, Towards behavioral control in multi-player network games, to appear in GameNets'09.
D. Korzun, B. Nechaev, A. Gurtov, Cyclic Routing: Generalizing Look-ahead in Peer-to-Peer Networks, to appear in 7th IEEE International Conference on Computer Systems and Applications, May 2009.
D. Korzun, B. Nechaev, A. Gurtov, CR-Chord: Improving Lookup Availability in the Presence of Malicious DHT Nodes, HIIT Technical Report 2008-2, December 2008.
J. Lindqvist and J-M. Tapio, Protecting Privacy with Protocol Stack Virtualization, in the 7th ACM CCS Workshop on Privacy in Electronic Society - WPES 2008, Alexandria, Virginia, USA, October 27th, 2008.
J. Koskela, J. Heikkila, A. Gurtov, A secure P2PSIP system with SPAM prevention, poster at ACM Mobicom, September 2008.
J. Lindqvist, "Yksityisyyden suoja verkotutetussa yhteiskunnassa", Book Chapter. TUVJ 1/2008 Silmät auki. Tietoyhteiskunnan uhat ja mahdollisuudet Silmät auki! Tietoyhteiskunnan uhat ja mahdollisuudet. Toim. Ville Eloranta. Eduskunnan tulevaisuusvaliokunta. ISBN 978-951-53-3043-7 (nid.) ISBN 978-951-53-3044-4 (PDF).
J. Lindqvist, System-Wide Privacy Protection for Mobile Computers, two-page extended abstract for Hotmobile Doctoral Consortium.
T. Aura, J Lindqvist, M. Roe, A. Mohammed, Chattering Laptops, in proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS), Leuven, Belgium, July 23-25, 2008.
A. Markkola and J. Lindqvist, Accessible Voice CAPTCHAs for Internet Telephony in The Symposium on Accessible Privacy and Security (SOAPS '08) part of 2008 Symposium on Usable Privacy and Security (SOUPS), July 23, 2008, Pittsburgh, PA, USA.
V. Mazalov, I. Falko, A. Gurtov, A. Pechnikov, Arbitration in a P2P-system, in Proc. of 13-th International Symposium on Dynamic Games and Applications, July 2008.
J. Koskela, A HIP-based peer-to-peer communication system, International Conference on Telecommunications, 2008. 16-19 June 2008, Proceedings CDROM ISBN: 978-1-4244-2036-0, Page(s): 1-7, St. Petersburg, Russia, June 2008.
D. Korzun, A. Gurtov, A Diophantine Model of Routes in Structured P2P Overlays, ACM Performance Evaluation Review, 35(4), p. 52-61, March 2008.
A. Lukyanenko, A. Gurtov, Performance analysis of general backoff protocols, Journal of Communications Software and Systems, 4(1), March 2008.
A. Gurtov, D. Korzun, A. Lukyanenko, P. Nikander, Hi3: An Efficient and Secure Networking Architecture for Mobile Hosts, Computer Communications, 31 (2008), p.2457-2467.
O. Ponomarev, A. Gurtov, Using DNS as an Access Protocol for Mapping Host Identifiers to Locators, to appear in Proceedings of Routing in Next Generation Workshop, Madrid, Spain, December 2007.
D.Andersen, H.Balakrishnan, N.Feamster, T.Koponen, D.Moon and S.Shenker, Holding the Internet Accountable, In Proc. of ACM Hot Topics in Networks, November 2007.
M. Demmer, K.Fall, T.Koponen, and S.Shenker, Towards a Modern Communications API, In Proc. of ACM Hot Topics in Networks, November 2007.
D.Korzun, A.Gurtov, An infrastructure for mobile application communications, In Proc. of Russian Conference on Scientific service in Internet, October 2007.
A.Lukyanenko, On the optimality and the stability of backoff protocol, In Proc. of NEW2AN 2007. (with Univ.of Kuopio), September 2007.
J.Lindqvist, Privacy in Networked Mobile Device Configuration, Doctoral Colloquium at the 9th International Conference on Ubiquitous Computing (UbiComp 2007 - DC), September 2007.
J.Lindqvist, Talk on Privacy-Preserving Access Point Discovery for Mobile Devices (privacy-preserving rendezvous), in International School on Foundations of Security Analysis and Design (FOSAD 2007), September 2007.
T.Koponen, M.Chawla, B.Chun, A.Ermolinskiy, K.Kim, S.Shenker, I.Stoica, A data-oriented (and beyond) network architecture, ACM Sigcomm 2007, August 2007.
J.Lindqvist, E.Vehmersalo, M.Komu and J.Manner, Enterprise Network Packet Filtering for Mobile Cryptographic Identities, two-page abstract presented in the posters session at the USENIX 2007 Annual Technical Conference, August 2007.
J.Lindqvist, Privacy-Preserving WLAN Access Point Discovery, two-page abstract presented in the posters session of 16th USENIX Security Symposium, August 2007.
J.Hautakorpi, J.Koskela, Utilizing HIP (Host Identity Protocol) for P2PSIP (Peer-to-peer Session Initiation Protocol), draft-hautakorpi-p2psip-with-hip-00.txt, July 2007.
K. Karvonen, Users and Trust: the New Threats, the New Possibilities, In Proc. of The 4th International Conference on Universal Access in Human-Computer Interaction, July 2007.
K.Karvonen, J.Lindqvist, Usability Improvements for WLAN Access, Proceedings of The 12th International Conference on Human-Computer Interaction (HCI International 2007), July 2007.
C.Hota, J.Lindqvist, K.Karvonen, A.Yla-Jaaski, C.K.J.Mohan, Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing, in Proceedings of The International Conference on Networking, Architecture, and Storage, 2007 (NAS 2007), July 2007.
K. Karvonen, Enabling Trust between Humans and Machines. Proceedings of The European e-Identity Conference, eema's 20 th Annual Conference, June 2007.
J. Lindqvist, IPv6 is Bad for your Privacy, Whitepaper and talk in DEFCON 15, June 2007.
E. Uzun, K. Karvonen, N. Asokan, Usability Analysis of Secure Pairing Methods, to appear in Proceedings of Usable Security (USEC'07), February 15-16, 2007, Trinidad&Tobago, a workshop co-located with The Eleventh Conference on Financial Cryptography and Data Security (FC'07), LNCS
J. Lindqvist and M. Komu, Cure for Spam over Internet Telephony, to appear in 4th IEEE Consumer Communications and Networking Conference - IEEE CCNC 2007, Las Vegas, USA, 11-13 January 2007.
J. Lindqvist, IPv6 Stateless Address Autoconfiguration Considered Harmful, to appear in Military Communications Conference - MILCOM 2006, Washington, D.C., USA, October 23-25, 2006.
K. Karvonen, It Takes a Lunatic, and Other Stories about Online Trust, ACM CSCW, November 2006.
P. Nikander, Aiming for open and fair markets and balanced privacy, US-EU Cyber Trust summit, November 2006.
A. Gurtov, Overview of HIP Infrastructure, AMICT'06, August 2006.
D. Korzun, A. Gurtov, On Scalability Properties of the Hi3 Control Plane, Elsevier Computer Communications, 29(17):3591-3601, November 2006.
D. Korzun, A. Gurtov, On Applying Linear Diophantine Equations to Route Modeling in Self-Organizing Networks, Elektrosvyaz, 6:34-38, June 2006.
R. Leino, Urkinta kasvaa netissa kauhuvauhtia, Tekniikka&Talous, 29.9.2006
T. Koponen, A Data-Oriented Network Architecture, PhD thesis, Helsinki University of Technology, October 2008.
A. Markkola, Preventing Spam in Internet Telephony - Implementation and Usability Evaluation, Master's Thesis, May 2008.
A. Myllyniemi, Privacy for WLAN Discovery, Master's Thesis, May 2008.K. Karvonen, Bridging The Gap Between Human And Machine Trust, PhD thesis, Helsinki University of Technology, May 2007.
Juha-Matti Tapio, Palomuurien keskitetty hallinta, Bachelor Thesis, University of Helsinki, February 2007.
S. Varjonen, Security in 3G networks, Master thesis, University of Helsinki,October 2006.
J. Lindqvist, Privacy in Network Configuration, PhLic thesis (in completion state)