default search action
Mikael Asplund
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Johannes Wilson, Mikael Asplund, Niklas Johansson, Felipe Boeira:
Provably Secure Communication Protocols for Remote Attestation. ARES 2024: 1:1-1:12 - 2023
- [c40]Ahmad B. Usman, Nigel Cole, Mikael Asplund, Felipe Boeira, Christian Vestlund:
Remote Attestation Assurance Arguments for Trusted Execution Environments. SAT-CPS@CODASPY 2023: 33-42 - [c39]Roland Plaka, Mikael Asplund, Simin Nadjm-Tehrani:
Vulnerability Analysis of an Electric Vehicle Charging Ecosystem. critis 2023: 155-173 - [c38]Johannes Wilson, Mikael Asplund, Niklas Johansson:
Extending the Authentication Hierarchy with One-Way Agreement. CSF 2023: 214-228 - [c37]Felipe Boeira, Mikael Asplund, Marinho P. Barcellos:
Provable Non-Frameability for 5G Lawful Interception. WISEC 2023: 109-120 - 2022
- [c36]Felipe Boeira, Mikael Asplund:
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol. CSF 2022: 305-318 - [c35]Anton Hölscher, Mikael Asplund, Felipe Boeira:
Evaluation of an SDN-based Microservice Architecture. NetSoft 2022: 151-156 - [c34]David Lantz, Felipe Boeira, Mikael Asplund:
Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters. NordSec 2022: 120-138 - [c33]Felipe Boeira, Mikael Asplund, Marinho P. Barcellos:
No Doppelgänger: Advancing Mobile Networks Against Impersonation in Adversarial Scenarios. WISEC 2022: 280-281 - 2021
- [j13]Carlos Felipe Emygdio de Melo, Tulio Dapper e Silva, Felipe Boeira, Jorgito Matiuzzi Stocchero, Alexey V. Vinel, Mikael Asplund, Edison Pignaton de Freitas:
UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks. IEEE Access 9: 82930-82946 (2021) - [j12]Abhimanyu Rawat, Mohammad Khodari, Mikael Asplund, Andrei V. Gurtov:
Decentralized Firmware Attestation for In-Vehicle Networks. ACM Trans. Cyber Phys. Syst. 5(1): 7:1-7:23 (2021) - [e2]Mikael Asplund, Simin Nadjm-Tehrani:
Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings. Lecture Notes in Computer Science 12556, Springer 2021, ISBN 978-3-030-70851-1 [contents] - [i2]Felipe Boeira, Mikael Asplund:
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol. CoRR abs/2105.02664 (2021) - 2020
- [j11]Sara Bergman, Mikael Asplund, Simin Nadjm-Tehrani:
Permissioned blockchains and distributed databases: A performance study. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j10]Tobias Sund, Claes Lööf, Simin Nadjm-Tehrani, Mikael Asplund:
Blockchain-based event processing in supply chains - A case study at IKEA. Robotics Comput. Integr. Manuf. 65: 101971 (2020) - [j9]Mikael Asplund:
Combining Detection and Verification for Secure Vehicular Cooperation Groups. ACM Trans. Cyber Phys. Syst. 4(1): 10:1-10:31 (2020)
2010 – 2019
- 2019
- [j8]Felipe Boeira, Mikael Asplund, Marinho P. Barcellos:
Decentralized proof of location in vehicular Ad Hoc networks. Comput. Commun. 147: 98-110 (2019) - [c32]Mohammad Khodari, Abhimanyu Rawat, Mikael Asplund, Andrei V. Gurtov:
Decentralized Firmware Attestation for In-Vehicle Networks. CPSS@AsiaCCS 2019: 47-56 - [c31]Filip Strömbäck, Linda Mannila, Mikael Asplund, Mariam Kamkar:
A Student's View of Concurrency - A Study of Common Mistakes in Introductory Courses on Concurrency. ICER 2019: 229-237 - [c30]Gunnar Grimsdal, Patrik Lundgren, Christian Vestlund, Felipe Boeira, Mikael Asplund:
Can Microkernels Mitigate Microarchitectural Attacks? NordSec 2019: 238-253 - [e1]Mikael Asplund, Michael Paulitsch:
4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, CERTS@ECRTS 2019, July 9, 2019, Stuttgart, Germany. OASIcs 73, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2019, ISBN 978-3-95977-119-1 [contents] - 2018
- [j7]Mikael Asplund:
Automatically proving the correctness of vehicle coordination. ICT Express 4(1): 51-54 (2018) - [c29]Mikael Asplund, Sibin Mohan:
CERTS 2018 Introduction. DSN Workshops 2018: 164-165 - [c28]Sibin Mohan, Mikael Asplund, Gedare Bloom, Ahmad-Reza Sadeghi, Ahmad Ibrahim, Negin Salajageh, Paul Griffioen, Bruno Sinopoli:
The future of IoT security: special session. EMSOFT 2018: 16:1-16:7 - [c27]Felipe Boeira, Mikael Asplund, Marinho P. Barcellos:
Vouch: A Secure Proof-of-Location Scheme for VANETs. MSWiM 2018: 241-248 - [c26]Mikael Asplund, Jakob Lovhall, Simin Nadjm-Tehrani:
In-Store Payments Using Bitcoin. NTMS 2018: 1-6 - [c25]Felipe Boeira, Mikael Asplund, Marinho P. Barcellos:
Mitigating Position Falsification Attacks in Vehicular Platooning. VNC 2018: 1-4 - 2017
- [c24]Chih-Yuan Lin, Simin Nadjm-Tehrani, Mikael Asplund:
Timing-Based Anomaly Detection in SCADA Networks. CRITIS 2017: 48-59 - [c23]Felipe Boeira, Marinho P. Barcellos, Edison Pignaton de Freitas, Alexey V. Vinel, Mikael Asplund:
On the impact of sybil attacks in cooperative driving scenarios. Networking 2017: 1-2 - [c22]Mikael Asplund, Jakob Lovhall, Emília Villani:
Specification, Implementation and Verification of Dynamic Group Membership for Vehicle Coordination. PRDC 2017: 321-328 - [c21]Felipe Boeira, Marinho P. Barcellos, Edison Pignaton de Freitas, Alexey V. Vinel, Mikael Asplund:
Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning. VNC 2017: 53-60 - 2016
- [j6]Mikael Asplund, Simin Nadjm-Tehrani:
Attitudes and Perceptions of IoT Security in Critical Societal Services. IEEE Access 4: 2130-2138 (2016) - [j5]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund:
Fairness and Incentive Considerations in Energy Apportionment Policies. ACM Trans. Model. Perform. Evaluation Comput. Syst. 2(1): 2:1-2:29 (2016) - [c20]Robert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi, Mathias Ekstedt:
Exploiting Bro for Intrusion Detection in a SCADA System. CPSS@AsiaCCS 2016: 44-51 - [c19]Tim Hultman, Abdeldjalil Boudjadar, Mikael Asplund:
Connectivity-optimal shortest paths using crowdsourced data. PerCom Workshops 2016: 1-6 - 2015
- [c18]Mikael Asplund:
Model-Based Membership Verification in Vehicular Platoons. DSN Workshops 2015: 125-132 - [c17]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund:
Sharing the Cost of Lunch: Energy Apportionment Policies. Q2SWinet@MSWiM 2015: 91-97 - 2014
- [j4]Aruna Prem Bianzino, Mikael Asplund, Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Cooperative proxies: Optimally trading energy and quality of service in mobile devices. Comput. Networks 75: 297-312 (2014) - [c16]Brieuc Viel, Mikael Asplund:
Why is fingerprint-based indoor localization still so hard? PerCom Workshops 2014: 443-448 - [c15]Mikael Asplund:
Poster: Securing vehicular platoon membership. VNC 2014: 119-120 - [i1]Mikael Asplund, Simin Nadjm-Tehrani:
Modelling Correlated Mobility. CoRR abs/1409.6431 (2014) - 2013
- [c14]Shu Zhang, Mikael Asplund, Vinny Cahill:
Reliable broadcast in vehicular ad-hoc networks. IWCMC 2013: 1640-1647 - 2012
- [j3]Mikael Asplund, Simin Nadjm-Tehrani:
Worst-case latency of broadcast in intermittently connected networks. Int. J. Ad Hoc Ubiquitous Comput. 11(2/3): 125-138 (2012) - [j2]Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani, Tiziano Santoro:
Surviving Attacks in Challenged Networks. IEEE Trans. Dependable Secur. Comput. 9(6): 917-929 (2012) - [c13]Mikael Asplund, Simin Nadjm-Tehrani:
Analysing Delay-Tolerant Networks with Correlated Mobility. ADHOC-NOW 2012: 83-97 - [c12]Mikael Asplund, Atif Manzoor, Mélanie Bouroche, Siobhán Clarke, Vinny Cahill:
A Formal Approach to Autonomous Vehicle Coordination. FM 2012: 52-67 - [c11]Atif Manzoor, Mikael Asplund, Mélanie Bouroche, Siobhán Clarke, Vinny Cahill:
Trust Evaluation for Participatory Sensing. MobiQuitous 2012: 176-187 - 2011
- [b1]Mikael Asplund:
Disconnected Discoveries: Availability Studies in Partitioned Networks. Linköping University, Sweden, 2011 - [c10]Jonas Lundberg, Mikael Asplund:
Communication problems in crisis response. ISCRAM 2011 - [c9]Mikael Asplund, Anton Thomasson, Ekhiotz Jon Vergara, Simin Nadjm-Tehrani:
Software-related energy footprint of a wireless broadband module. MOBIWAC 2011: 75-82 - [c8]Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund, Urko Zurutuza:
Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms. NGMAST 2011: 154-160 - 2010
- [c7]Mikael Asplund, Trishan R. de Lanerolle, Christopher Fei, Prasanna Gautam, Ralph A. Morelli, Simin Nadjm-Tehrani, Gustav Nykvist:
Wireless ad hoc dissemination for search and rescue. ISCRAM 2010 - [c6]Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani:
Anomaly Detection and Mitigation for Disaster Area Networks. RAID 2010: 339-359
2000 – 2009
- 2009
- [j1]Mikael Asplund, Simin Nadjm-Tehrani, Klemen Zagar:
Middleware extensions that trade consistency for availability. Concurr. Comput. Pract. Exp. 21(9): 1181-1203 (2009) - [c5]Mikael Asplund, Simin Nadjm-Tehrani:
A Partition-Tolerant Manycast Algorithm for Disaster Area Networks. SRDS 2009: 156-165 - 2008
- [c4]Mikael Asplund, Simin Nadjm-Tehrani, Johan Sigholm:
Emerging Information Infrastructures: Cooperation in Disasters. CRITIS 2008: 258-270 - 2007
- [c3]Mikael Asplund, Simin Nadjm-Tehrani, Stefan Beyer, Pablo Galdámez:
Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints. DSN 2007: 656-665 - 2006
- [c2]Mikael Asplund, Simin Nadjm-Tehrani:
Formalising Reconciliation in Partitionable Networks with Distributed Services. RODIN Book 2006: 37-58 - [c1]Mikael Asplund, Simin Nadjm-Tehrani:
Post-partition reconciliation protocols for maintaining consistency. SAC 2006: 710-717
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint