Philip Ginzboorg

Professor of Practice
Professor of Practice
T313 Dept. Computer Science
Full researcher profile
https://research.aalto.fi/...
Phone number
+358504836224

Publications

Authentication of fragments with short tags

Philip Ginzboorg, Valtteri Niemi, Jörg Ott 2024 Theoretical Computer Science

Attestation with Constrained Relying Party

Mariam Moustafa, Arto Niemi, Philip Ginzboorg, Jan Erik Ekberg 2024 Proceedings of the 10th International Conference on Information Systems Security and Privacy

Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility

Gizem Akman, Philip Ginzboorg, Mohamed Taoufiq Damir, Valtteri Niemi 2023 Computers

Split keys for station-to-station (STS) protocols

Gizem Akman, Mohamed Taoufiq Damir, Philip Ginzboorg, Sampo Sovio, Valtteri Niemi 2023 Journal of Surveillance, Security and Safety

AKMA for Secure Multi-access Edge Computing Mobility in 5G

Gizem Akman, Philip Ginzboorg, Valtteri Niemi 2022 Computational Science and Its Applications- ICCSA 2022 Workshops, Proceedings

Privacy-Aware Access Protocols for MEC Applications in 5G

Gizem Akman, Philip Ginzboorg, Valtteri Niemi 2022 Network

Trusted Hart for Mobile RISC-V Security

V. Ushakov, S. Sovio, Q. Qi, V. Nayani, V. Manea, P. Ginzboorg, J. E. Ekberg 2022 Proceedings - 2022 IEEE 21st International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022

Privacy-Preserving Access for Multi-Access Edge Computing (MEC) Applications

Gizem Akman, Philip Ginzboorg, Valtteri Niemi 2021 Computational Science and Its Applications – ICCSA 2021

Credential Provisioning and Device Configuration with EAP

Sebastien Boire, Tolgahan Akgün, Philip Ginzboorg, Pekka Laitinen, Sandeep Tamrakar, Tuomas Aura 2021 MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access

AKMA: Delegated Authentication System of 5G

Mohsin Khan, Philip Ginzboorg, Valtteri Niemi 2021 IEEE Communications Standards Magazine

AKMA Support in Multi SIM User Equipment

Gizem Akman, Valtteri Niemi, Philip Ginzboorg 2019 Proceedings of the 25th Conference of Open Innovations Association FRUCT, FRUCT 2019

Privacy preserving AKMA in 5G

Mohsin Khan, Philip Ginzboorg, Valtteri Niemi 2019 SSR 2019 - Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop

Estimating Message Transmission Time over Heterogeneous Disrupted Links

Philip Ginzboorg, Valtteri Niemi, Jorg Ott 2018 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018

Defeating the downgrade attack on identity privacy in 5G

Mohsin Khan, Philip Ginzboorg, Kimmo Järvinen, Valtteri Niemi 2018 Security Standardisation Research - 4th International Conference, SSR 2018, Proceedings

IMSI-based Routing and Identity Privacy in 5G

Mohsin Khan, Valtteri Niemi, Philip Ginzboorg 2018 FRUCT'22: Proceedings of the 22st Conference of Open Innovations Association FRUCT

On De-synchronization of User Pseudonyms in Mobile Networks

Mohsin Khan, Kimmo Järvinen, Philip Ginzboorg, Valtteri Niemi 2017 Information Systems Security. ICISS 2017

Privacy of the Long-Term Identities in Cellular Networks

Philip Ginzboorg, Valtteri Niemi 2016 2nd International Workshop on 5G Security (IW5GS 2016), 19 June 2016, Xi'an, China

From the rigid hierarchical to flexible flow-based 5G architecture: dimensioning issues

Andrey Krendzel, Philip Ginzboorg 2015 The 6th International Conference On Network of the Future (NoF 2015), Montreal, QC, Canada, Sep. 30 Oct. 2, 2015

Message Fragmentation for a Chain of Disrupted Links.

Philip Ginzboorg, Valtteri Niemi, Jörg Ott 2014 Computer Communications

Expected Penetration Rate of 5G Mobile Users by 2020: A Case Study

Andrey Krendzel, Philip Ginzboorg 2014 The Fourth International Conference on Mobile Services, Resources, and Users. MOBILITY 2014: July 20-24, 2014, Paris, France

Inferring Social Ties in Academic Networks Using Short-Range Wireless Communication

Igor Bilogrevic, Kevin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi 2013 ACM Workshop on Privacy in the Electronic Society (WPES), Berlin, Germany, November 4 2013

Fragmentation algorithms for DTN links

Philip Ginzboorg, Valtteri Niemi, Jörg Ott 2013 Computer Communications

Big Brother Knows Your Friends: on Privacy of Social Communities in Pervasive Networks

Igor Bilogrevic, Murtuza Jadliwala, Istvan Lam, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Laurent Bindschaedler, Jean-Pierre Hubaux 2012 10th International Conference on Pervasive Computing (PERVASIVE 2012), Newcastle, UK,June 18-22, 2012

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks

Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux 2012 19th Annual Network & Distributed System Security Symposium (NDSS 2012), San Diego, USA, 5-8 February 2012

Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks

Julien Freudiger, Murtuza Jadliwala, Jean-Pierre Hubaux, Valtteri Niemi, Philip Ginzboorg 2012 Mobile Networks and Applications

Message fragmentation for a chain of disrupted links

Philip Ginzboorg, Valtteri Niemi, Jörg Ott 2012 IEEE WoWMoM workshop on Autonomous and Opportunistic Communication (AOC), San Francisco, California, USA June 25-28, 2012

Nokia Instant Community at EPFL: a real-world large-scale wireless peer-to-peer trial

Imad Aad, Murtuza Jadliwala, Igor Bilogrevic, Valtteri Niemi, Jean-Pierre Hubaux, Philip Ginzboorg, Kari Leppänen 2011

Message Fragmentation for Disrupted Links

Philip Ginzboorg, Valtteri Niemi, Jörg Ott 2011 EW 17th European Wireless Conference, Vienna, Austria, April 27-29, 2011

Best-effort authentication for opportunistic networks

J. Solis, P. Ginzboorg, N. Asokan, J. Ott 2011 IPCCC 30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011, Orlando, FL, 17 November 2011 - 19 November 2011

DTM Communication in a Mine

Philip Ginzboorg, Teemu Kärkkäinen, Aki Ruotsalainen, Mikael Andersson, Jörg Ott 2010 2nd Extreme Workshop on Communications Dharamsala, India, 4-10 September, 2010

DTN Communication in a Mine

Philip Ginzboorg, Teemu Kärkkäinen, Aki Ruotsalainen, Mikael Andersson, Jörg Ott 2010 2nd Extreme Workshop on Communication (ExtremeCom)

Reachability in restricted walk on integers

Philip Ginzboorg, Valtteri Niemi 2010 Journal of Universal Computer Science

Controlling Resource Hogs in Mobile Delay-tolerant Networks

John Solis, Nadarajah Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott 2010 Computer Communications

Cellular Authentication for Mobile and Internet Services

Silke Holtmanns, Valtteri Niemi, Philip Ginzboorg, Pekka Laitinen, N. Asokan 2008

Applicability of identity-based cryptography for disruption-tolerant networking

N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo 2007 MobiOpp'07

Towards Securing Disruption-Tolerant Networking

N. Asokan, Kari Kostiainen, Philip Ginzboorg, Jörg Ott, Cheng Luo 2007

Framework for com parative usability testing for distributed applications

Kari Kostiainen, N. Asokan, Ersin Uzun, Philip Ginzboorg 2007

Visitor access management in personal wireless networks

N. Asokan, Seamus Moloney, Philip Ginzboorg, Kari Kostiainen 2005 Proceedings - Seventh IEEE International Symposium on Multimedia, ISM 2005

Extending cellular authentication as a service

P. Laitinen, P. Ginzboorg, N. Asokan, S. Holtmanns, V. Niemi 2005 1st IEE International Conference on Commercialising Technology and Innovation

Security for interactions in pervasive networks

Seamus Moloney, Philip Ginzboorg 2005 Security in Ad-hoc and Sensor Networks

Key agreement in ad hoc networks

N. Asokan, P. Ginzboorg 2000 Computer Communications

Seven comments on charging and billing

Philip Ginzboorg 2000 Communications of the ACM

Charging for broadband access

Philip Ginzboorg, Jan-Erik Ekberg, Pekka Laitinen, Antti Ylä-Jääski 1998 1st International Conference on Telecommunications and Electronic Commerce (ICTEC)

Lowpass traffic policing mechanism based on the leaky bucket

P. Ginzboorg, P. Grönberg 1998 Electronics Letters

Methods to synchronize the IN SCP’s overload protection mechanism

Philip Ginzboorg 1996 Intelligent Networks and Intelligence in Networks