His primary scientific interests are in Computer network, Authentication, Computer security, Network packet and Node. His work deals with themes such as Network Access Device and Mobile database, which intersect with Computer network. His biological study spans a wide range of topics, including Trusted third party, Terminal and Secure communication.
His study focuses on the intersection of Computer security and fields such as Mobile device with connections in the field of Isolation, Password, Trusted Computing, Service provider and Provisioning. Jan-Erik Ekberg has researched Network packet in several fields, including Session key, Replay attack, Shared secret and Ring network. His study in Node is interdisciplinary in nature, drawing from both Computer program, Layer, Distributed computing and Directory service.
The scientist’s investigation covers issues in Computer network, Computer security, Authentication, Computer program and Embedded system. His Computer network research is multidisciplinary, incorporating elements of Network Access Control and Network Access Device. The concepts of his Computer security study are interwoven with issues in Usability and Mobile device.
His work carried out in the field of Authentication brings together such families of science as Payment, Smart card and Public-key cryptography. His Computer program research focuses on Distributed computing and how it relates to Layer and Key. His Embedded system research is multidisciplinary, incorporating perspectives in Terminal, Software and Hardware security module.
Jan-Erik Ekberg mainly investigates Computer security, Computer network, Software, Authentication and Software deployment. His work deals with themes such as Mobile device and Mobile computing, which intersect with Computer security. His study looks at the intersection of Computer network and topics like Cloud computing with Information privacy.
His work is dedicated to discovering how Software, Embedded system are connected with Hardware security module and other disciplines. The concepts of his Authentication study are interwoven with issues in Port, Call stack and Access control. The study incorporates disciplines such as User space, Instrumentation, Metadata and Microcontroller in addition to Software deployment.
Jan-Erik Ekberg mostly deals with Computer security, Hardware security module, Software, Embedded system and Authentication. Jan-Erik Ekberg interconnects Identity and Mobile computing in the investigation of issues within Computer security. Jan-Erik Ekberg combines subjects such as Network security, Malware, Cloud computing, Enterprise information security architecture and Information privacy with his study of Hardware security module.
In the subject of general Software, his work in Memory corruption is often linked to Indirect branch, thereby combining diverse domains of study. Within one scientific family, Jan-Erik Ekberg focuses on topics pertaining to Source code under Embedded system, and may sometimes address concerns connected to Direct Anonymous Attestation. His Authentication research includes themes of Compiler and Microarchitecture.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Implementation of charging in a telecommunications system
Phillip Ginzboorg;Jan-Erik Ekberg;Antti Yla-Jaaski.
(1997)
Authentication in a packet data network
Antti Kuikka;Henry Haverinen;Jan-Erik Ekberg;Juha Ala-Laurila.
(2001)
Content distribution & communication system for enhancing service distribution in short range radio environment
Outi Markki;Jan-Erik Ekberg;Heikki Kokkinenh;Mika Kuoppala.
(2006)
Implementation of access service
Philip Ginzboorg;Jan-Erik Gustav Ekberg;Pekka Johannes Laitinen;Antti Ylä-J{umlaut over }ski.
(1998)
Secure device pairing based on a visual channel
Nitesh Saxena;Jan-Erik Ekberg;Kari Kostiainen;N. Asokan.
ieee symposium on security and privacy (2006)
C-FLAT: Control-Flow Attestation for Embedded Systems Software
Tigist Abera;N. Asokan;Lucas Davi;Jan-Erik Ekberg.
computer and communications security (2016)
System and method for authentication in a mobile communications system
Ekberg Jan-Erik.
(1999)
Administration of wireless local area networks
Nadarajah Asokan;Philip Ginzboorg;Seamus Moloney;Kari Ti. Kostiainen.
(2005)
Electronic payment schemes in a mobile environment for short-range transactions
Sampo Sovio;Jan-Erik Ekberg;Nadarajah Asokan;Pekka Lahtinen.
(2005)
Device detection and service discovery system and method for a mobile ad hoc communications network
Jan-Erik Ekberg;Pekka Lahtinen;Jaakko Lipasti.
(2003)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Waterloo
Nokia (United States)
Technical University of Darmstadt
University of Alabama at Birmingham
University of Duisburg-Essen
University of California, Irvine
Bar-Ilan University
Nokia (Finland)
Aalto University
IBM (United States)
Technical University of Munich
Council for Scientific and Industrial Research
Centre national de la recherche scientifique, CNRS
University of Maryland, Baltimore County
University of Houston
Colorado State University
Chinese Academy of Sciences
University of Granada
J. Craig Venter Institute
University of Southern California
National Park Service
University of Cambridge
Université Libre de Bruxelles
University of Pittsburgh
Binghamton University