2018 - ACM Fellow For contributions to systems security and privacy, especially of mobile systems
2017 - IEEE Fellow For contributions to system security and privacy
2015 - ACM Distinguished Member
The scientist’s investigation covers issues in Computer security, Computer network, Authentication, Digital signature and Context. He studies Cryptography, a branch of Computer security. His Computer network study incorporates themes from Key and Network Access Device.
His studies deal with areas such as Gateway, Cellular digital packet data, Computer program, GSM and Alias as well as Authentication. While the research belongs to areas of Digital signature, he spends his time largely on the problem of Public-key cryptography, intersecting his research to questions surrounding Certificate. His Context research is multidisciplinary, incorporating elements of Security policy, Delay-tolerant networking, Identity and Bootstrapping.
Nadarajah Asokan mainly focuses on Computer security, Computer network, Authentication, Mobile device and Software. His Computer security research integrates issues from Context and Usability. The concepts of his Computer network study are interwoven with issues in Wireless, Bluetooth and Cloud computing.
His Authentication research is multidisciplinary, relying on both Smart card and Cryptography. Mobile device and Trusted Computing are frequently intertwined in his study. His studies in Password integrate themes in fields like Phishing and Server.
Nadarajah Asokan mostly deals with Computer security, Authentication, Computer network, Cloud computing and Software. His work carried out in the field of Computer security brings together such families of science as Phishing and World Wide Web. The study incorporates disciplines such as Class, Context, Usability and Access control in addition to Authentication.
His research integrates issues of Trusted Computing and Wireless in his study of Computer network. The various areas that he examines in his Cloud computing study include Latency, Service, Artificial neural network, Data loss and Key distribution. Nadarajah Asokan has researched Software in several fields, including Instrumentation, Software deployment, Pointer, Embedded system and Control flow.
His scientific interests lie mostly in Computer security, Software, Computer network, Malware and Cloud computing. His Computer security research incorporates themes from Scheme, Phishing and Identification. His Software study integrates concerns from other disciplines, such as Security service, Instrumentation and Embedded system.
Nadarajah Asokan conducts interdisciplinary study in the fields of Computer network and Service provider through his research. His study in Malware is interdisciplinary in nature, drawing from both Context, Intrusion detection system, Internet privacy and Training set. Nadarajah Asokan combines subjects such as Quality of service, Latency, Secure two-party computation and Network security with his study of Cloud computing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Optimistic protocols for fair exchange
N. Asokan;Matthias Schunter;Michael Waidner.
computer and communications security (1997)
Key agreement in ad hoc networks
N Asokan;P Ginzboorg.
Computer Communications (2000)
Asynchronous protocols for optimistic fair exchange
N. Asokan;V. Shoup;M. Waidner.
ieee symposium on security and privacy (1998)
State of the art in electronic payment systems
N. Asokan;Philippe A. Janson;Michael Steiner;Michael Waidner.
Advances in Computers (2000)
The state of the art in electronic payment systems
N. Asokan;P.A. Janson;M. Steiner;M. Waidner.
IEEE Computer (1997)
Man-in-the-middle in tunnelled authentication protocols
international workshop on security (2003)
Authentication in a packet data network
Antti Kuikka;Henry Haverinen;Jan-Erik Ekberg;Juha Ala-Laurila.
Oblivious Neural Network Predictions via MiniONN Transformations
Jian Liu;Mika Juuti;Yao Lu;N. Asokan.
computer and communications security (2017)
Fairness in electronic commerce
Protecting the Computation Results of Free-Roaming Agents
Günter Karjoth;N. Asokan;Ceki Gülcü.
Lecture Notes in Computer Science (1998)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: