Miika Komu
Miika Komu
Aalto University, Department of Computer Science and Engineering, Data Communications Software Group
Verified email at aalto.fi
Title
Cited by
Cited by
Year
Hypervisors vs. lightweight virtualization: a performance comparison
R Morabito, J Kjšllman, M Komu
2015 IEEE International Conference on Cloud Engineering, 386-393, 2015
4192015
Capillary networks-bridging the cellular and iot worlds
O Novo, N Beijar, M Ocak, J Kjšllman, M Komu, T Kauppinen
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 571-578, 2015
822015
Host Identity Protocol (HIP): Identifier/locator split for host mobility and multihoming
A Gurtov, M Komu, R Moskowitz
Internet Protocol Journal 12 (1), 27-32, 2009
532009
Using the Host Identity Protocol with legacy applications
T Henderson, P Nikander, M Komu
RFC 5338 (Experimental), Sep, 2008
292008
Cure for spam over internet telephony
J Lindqvist, M Komu
2007 4th IEEE Consumer Communications and Networking Conference, 896-900, 2007
292007
Secure networking for virtual machines in the cloud
M Komu, M Sethi, R Mallavarapu, H Oirola, R Khan, S Tarkoma
2012 IEEE International Conference on Cluster Computing Workshops, 88-96, 2012
282012
Basic Socket Interface Extensions for the Host Identity Protocol (HIP)
M Komu, T Henderson
RFC 6317, July, 2011
252011
Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators
M Komu, J Melen, H Tschofenig, T Henderson
25*2010
Applying a cryptographic namespace to applications
M Komu, S Tarkoma, J Kangasharju, A Gurtov
Proceedings of the 1st ACM Workshop on Dynamic Interconnection of Networks†…, 2005
202005
Socket application program interface (API) for multihoming shim
M Komu, M Bagnulo, K Slavov, S Sugimoto
draft-ietf-shim6-multihome-shim-api-03 (work in progress), 930-0804, 2007
192007
Energy consumption analysis of edge orchestrated virtualized wireless multimedia sensor networks
T Mekonnen, M Komu, R Morabito, T Kauppinen, E Harjula, T Koskela, ...
IEEE Access 6, 5090-5100, 2017
172017
A survey of identifier–locator split addressing architectures
M Komu, M Sethi, N Beijar
Computer Science Review 17, 25-42, 2015
172015
Application programming interfaces for the host identity protocol
M Komu
Master's thesis, Helsinki University of Technology, 2004
172004
An SDN-based approach to enhance the end-to-end security: SSL/TLS case study
A Ranjbar, M Komu, P Salmela, T Aura
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 281-288, 2016
162016
Adoption barriers of network layer protocols: The case of host identity protocol
T Levš, M Komu, A Keršnen, S Luukkainen
Computer Networks 57 (10), 2218-2232, 2013
142013
Secure and efficient IPv4/IPv6 handovers using host-based identifier-locator split
S Varjonen, M Komu, A Gurtov
Journal of Communications Software and Systems 6 (1), 1-9, 2010
142010
Secure cloud connectivity for scientific applications
L Osmani, S Toor, M Komu, MJ Kortelainen, T Lindťn, J White, R Khan, ...
IEEE Transactions on Services Computing 11 (4), 658-670, 2015
122015
End-host Authentication and Authorization for Middleboxes based on a Cryptographic Namespace
T Heer, R Hummen, M Komu, S Gotz, K Wehrle
2009 IEEE International Conference on Communications, 1-6, 2009
122009
An implementation of HIP for Linux
C Candolin, M Komu, M Kousa, J Lundberg
Proc. of the Linux Symposium, 2003
12*2003
Synaptic: Secure and persistent connectivity for containers
A Ranjbar, M Komu, P Salmela, T Aura
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid†…, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20