default search action
Miika Komu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Sepehr Javid, Miika Komu, Jimmy Kjällman:
QoS-Aware Congestion Control using SRv6. CSCN 2023: 228-234 - 2022
- [c21]Antti Kolehmainen, Miika Komu, Sepehr Javid, Jimmy Kjällman, Tero Kauppinen, Fayezeh Ghavimi, Bilhanan Silverajan:
Benchmarking of Emulated Wireless Edge Cloud Connectivity for Maritime Environments. WF-IoT 2022: 1-6 - 2021
- [j7]Lirim Osmani, Tero Kauppinen, Miika Komu, Sasu Tarkoma:
Multi-Cloud Connectivity for Kubernetes in 5G Networks. IEEE Commun. Mag. 59(10): 42-47 (2021) - [i6]Ari Keränen, Jan Melén, Miika Komu:
Native NAT Traversal Mode for the Host Identity Protocol. RFC 9028: 1-55 (2021) - [i5]Robert G. Moskowitz, Miika Komu:
Host Identity Protocol Architecture. RFC 9063: 1-41 (2021) - 2020
- [c20]Joel Reijonen, Miljenko Opsenica, Tero Kauppinen, Miika Komu, Jimmy Kjällman, Tomas Mecklin, Eero Hiltunen, Jari Arkko, Timo Simanainen, Mohammed Elmusrati:
Benchmarking Q-Learning Methods for Intelligent Network Orchestration in the Edge. 6G SUMMIT 2020: 1-5
2010 – 2019
- 2019
- [c19]Joel Reijonen, Miljenko Opsenica, Roberto Morabito, Miika Komu, Mohammed Elmusrati:
Regression Training using Model Parallelism in a Distributed Cloud. DASC/PiCom/DataCom/CyberSciTech 2019: 741-747 - 2018
- [j6]Tenager Mekonnen, Miika Komu, Roberto Morabito, Tero Kauppinen, Erkki Harjula, Timo Koskela, Mika Ylianttila:
Energy Consumption Analysis of Edge Orchestrated Virtualized Wireless Multimedia Sensor Networks. IEEE Access 6: 5090-5100 (2018) - [j5]Lirim Osmani, Salman Toor, Miika Komu, Matti J. Kortelainen, Tomas Lindén, John White, Rasib Hassan Khan, Paula Eerola, Sasu Tarkoma:
Secure Cloud Connectivity for Scientific Applications. IEEE Trans. Serv. Comput. 11(4): 658-670 (2018) - [p1]Erkki Harjula, Tenager Mekonnen, Miika Komu, Pawani Porambage, Tero Kauppinen, Jimmy Kjällman, Mika Ylianttila:
Energy Efficiency in Wireless Multimedia Sensor Networking: Architecture, Management and Security. Greening Video Distribution Networks 2018: 133-157 - 2017
- [c18]Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura:
SynAPTIC: Secure And Persistent connecTIvity for Containers. CCGrid 2017: 262-267 - 2016
- [j4]Tapio Levä, Mahya Ilaghi, Vilen Looga, Miika Komu, Nicklas Beijar, Oleksiy Mazhelis:
Adoption of Constrained Application Protocol: A Techno-Economic Perspective. Int. J. Innov. Digit. Econ. 7(1): 38-53 (2016) - [c17]Jimmy Kjällman, Miika Komu, Tero Kauppinen:
Power Aware Media Delivery Platform Based on Containers. ICIN 2016 - [c16]Miika Komu, Roberto Morabito, Tero Kauppinen, Jimmy Kjällman, Yong Yao:
Power consumption in remote gaming: An empirical evaluation. INFOCOM Workshops 2016: 736-741 - [c15]Alireza Ranjbar, Miika Komu, Patrik Salmela, Tuomas Aura:
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study. NOMS 2016: 281-288 - [c14]Maria Ines Robles, Domenico D'Ambrosio, Jaime Jimenez Bolonio, Miika Komu:
Device group management in constrained networks. PerCom Workshops 2016: 1-6 - 2015
- [j3]Miika Komu, Mohit Sethi, Nicklas Beijar:
A survey of identifier-locator split addressing architectures. Comput. Sci. Rev. 17: 25-42 (2015) - [c13]Roberto Morabito, Jimmy Kjällman, Miika Komu:
Hypervisors vs. Lightweight Virtualization: A Performance Comparison. IC2E 2015: 386-393 - [c12]Oscar Novo, Nicklas Beijar, Mert Ocak, Jimmy Kjällman, Miika Komu, Tero Kauppinen:
Capillary networks - bridging the cellular and IoT worlds. WF-IoT 2015: 571-578 - 2014
- [c11]Dung Vu Ba Tien, Miika Komu, Matti Siekkinen, Antti Ylä-Jääski:
H-box: Interconnecting devices across local networks. LCN 2014: 244-252 - [c10]Mahya Ilaghi, Tapio Levä, Miika Komu:
Techno-economic feasibility analysis of constrained application protocol. WF-IoT 2014: 153-158 - 2013
- [j2]Tapio Levä, Miika Komu, Ari Keränen, Sakari Luukkainen:
Adoption barriers of network layer protocols: The case of host identity protocol. Comput. Networks 57(10): 2218-2232 (2013) - 2012
- [c9]Yang Deng, Zhonghong Ou, Miika Komu, Vilen Looga, Antti Ylä-Jääski:
Anatomy of the connecting architecture of Internet of Things. CCIS 2012: 1230-1234 - [c8]Miika Komu, Mohit Sethi, Ramasivakarthik Mallavarapu, Heikki Oirola, Rasib Hassan Khan, Sasu Tarkoma:
Secure Networking for Virtual Machines in the Cloud. CLUSTER Workshops 2012: 88-96 - 2011
- [c7]Rasib Hassan Khan, Miika Komu, Tuomas Aura:
Applicability analysis of grid security mechanisms on cloud networking. CDC 2011: 65-70 - [i4]Miika Komu, Marcelo Bagnulo, Kristian Slavov, Shinta Sugimoto:
Sockets Application Program Interface (API) for Multihoming Shim. RFC 6316: 1-44 (2011) - [i3]Miika Komu, Thomas R. Henderson:
Basic Socket Interface Extensions for the Host Identity Protocol (HIP). RFC 6317: 1-18 (2011) - 2010
- [j1]Janne Lindqvist, Essi Vehmersalo, Miika Komu, Jukka Manner:
Enterprise Network Packet Filtering for Mobile Cryptographic Identities. Int. J. Handheld Comput. Res. 1(1): 79-94 (2010) - [c6]Miika Komu, Sasu Tarkoma, Andrey Lukyanenko:
Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles. NordSec 2010: 33-48 - [i2]Miika Komu, Thomas R. Henderson, Hannes Tschofenig, Jan Melén, Ari Keränen:
Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators. RFC 5770: 1-34 (2010)
2000 – 2009
- 2009
- [c5]Kristiina Karvonen, Miika Komu, Andrei V. Gurtov:
Usable security management with host identity protocol. AICCSA 2009: 279-286 - [c4]Miika Komu, Janne Lindqvist:
Leap-of-Faith Security is Enough for IP Mobility. CCNC 2009: 1-5 - [c3]Tobias Heer, René Hummen, Miika Komu, Stefan Götz, Klaus Wehrle:
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace. ICC 2009: 1-6 - 2008
- [i1]Thomas R. Henderson, Pekka Nikander, Miika Komu:
Using the Host Identity Protocol with Legacy Applications. RFC 5338: 1-14 (2008) - 2007
- [c2]Janne Lindqvist, Miika Komu:
Cure for Spam Over Internet Telephony. CCNC 2007: 896-900 - 2005
- [c1]Miika Komu, Sasu Tarkoma, Jaakko Kangasharju, Andrei V. Gurtov:
Applying a cryptographic namespace to applications. DIN@MobiCom 2005: 23-27
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-15 00:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint