Mika Ylianttila spends much of his time researching Computer network, Computer security, Cloud computing, Wireless network and Wireless lan. Many of his studies on Computer network involve topics that are commonly interrelated, such as Key distribution in wireless sensor networks. His biological study spans a wide range of topics, including Distributed database and Internet privacy.
His research investigates the connection with Cloud computing and areas like Software-defined networking which intersect with concerns in Broadband and Virtualization. Mika Ylianttila usually deals with Wireless lan and limits it to topics linked to Handover and Roaming, GPRS core network and General Packet Radio Service. Mika Ylianttila has included themes like Network Access Control, Computer security model and Mobile computing in his Security service study.
His primary areas of investigation include Computer network, Distributed computing, Computer security, Cloud computing and Mobile computing. Mika Ylianttila has researched Computer network in several fields, including Wireless network and Scalability. His Distributed computing research is multidisciplinary, incorporating elements of Network architecture, Overlay network and Cellular network.
His work in Computer security addresses subjects such as Cloud computing security, which are connected to disciplines such as Security service. His Mobile computing research is multidisciplinary, relying on both Multimedia, Mobile device and Mobile search. His studies deal with areas such as Wireless, Key distribution in wireless sensor networks and Session key as well as Wireless sensor network.
Mika Ylianttila focuses on Edge computing, Computer network, Cloud computing, Blockchain and Computer security. The study incorporates disciplines such as Virtualization, Use case and Software-defined networking in addition to Edge computing. He regularly links together related areas like Software deployment in his Computer network studies.
His Cloud computing study incorporates themes from Access network, Scalability, User equipment and Radio access network. Mika Ylianttila studied Scalability and Distributed computing that intersect with End-to-end principle. His work in the fields of Computer security, such as Key and Authentication, overlaps with other areas such as Efficient energy use.
Computer security, Blockchain, Cloud computing, Service provider and Key are his primary areas of study. His work on Authentication, Network security and Information security as part of general Computer security study is frequently connected to White paper, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. His studies in Blockchain integrate themes in fields like Quality of service, User experience design, The Internet and Virtual reality.
His Cloud computing research includes elements of Exploit, Scalability and Differential privacy. Mika Ylianttila interconnects Telecommunications, Risk analysis and Service level requirement in the investigation of issues within Key. His Microservices research incorporates themes from Access network, Computer network, Latency, Server and Swarm behaviour.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Handoff in hybrid mobile data networks
K. Pahlavan;P. Krishnamurthy;A. Hatami;M. Ylianttila.
IEEE Personal Communications (2000)
Survey on Multi-Access Edge Computing for Internet of Things Realization
Pawani Porambage;Jude Okwuibe;Madhusanka Liyanage;Mika Ylianttila.
IEEE Communications Surveys and Tutorials (2018)
Security in Software Defined Networks: A Survey
Ijaz Ahmad;Suneth Namal;Mika Ylianttila;Andrei Gurtov.
IEEE Communications Surveys and Tutorials (2015)
CloudThings: A common architecture for integrating the Internet of Things with Cloud Computing
Jiehan Zhou;Teemu Leppanen;Erkki Harjula;Mika Ylianttila.
computer supported cooperative work in design (2013)
Overview of 5G Security Challenges and Solutions
Ijaz Ahmad;Tanesh Kumar;Madhusanka Liyanage;Jude Okwuibe.
IEEE Communications Standards Magazine (2018)
Optimization scheme for mobile users performing vertical handoffs between IEEE 802.11 and GPRS/EDGE networks
M. Ylianttila;M. Pande;J. Makela;P. Mahonen.
global communications conference (2001)
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
Pawani Porambage;Corinna Schmitt;Pardeep Kumar;Andrei Gurtov.
wireless communications and networking conference (2014)
The Quest for Privacy in the Internet of Things
Pawani Porambage;Mika Ylianttila;Corinna Schmitt;Pardeep Kumar.
ieee international conference on cloud computing technology and science (2016)
Security for 5G and Beyond
Ijaz Ahmad;Shahriar Shahabuddin;Tanesh Kumar;Jude Okwuibe.
IEEE Communications Surveys and Tutorials (2019)
Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments
Pardeep Kumar;Andrei Gurtov;Jari Iinatti;Mika Ylianttila.
IEEE Sensors Journal (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Linköping University
Worcester Polytechnic Institute
University of Oulu
University of New South Wales
Shanghai Jiao Tong University
University of Oulu
University of Oulu
University of Melbourne
University of Oulu
University of New South Wales
Chinese University of Hong Kong
Universidad Tecnica Federico Santa Maria
University of Patras
Cornell University
National Research Council (CNR)
University of California, San Diego
Tokyo Institute of Technology
University of Queensland
University of Western Australia
Max Planck Society
Shandong University
Coastal Carolina University
Max Planck Society
Deakin University
Hudson Institute of Medical Research
University of Colorado Boulder