default search action
Jari Arkko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2009
- [j5]Jari Arkko, Bob Briscoe, Lars Eggert, Anja Feldmann, Mark Handley:
Dagstuhl perspectives workshop on end-to-end protocols for the future internet. Comput. Commun. Rev. 39(2): 42-47 (2009) - 2004
- [j4]James Kempf, Jari Arkko, Pekka Nikander:
Mobile IPv6 Security. Wirel. Pers. Commun. 29(3-4): 389-414 (2004) - 1990
- [j3]Jari Arkko, Vesa Hirvisalo, Juha Kuusela, Esko Nuutila:
Supporting testing of specifications and implementations. Microprocessing and Microprogramming 30(1-5): 297-302 (1990) - 1989
- [j2]Vesa Hirvisalo, Jari Arkko, Juha Kuusela, Esko Nuutila, Markku Tamminen:
XE design rationale: Clu revisited. ACM SIGPLAN Notices 24(9): 72-79 (1989) - 1987
- [j1]Esko Nuutila, Juha Kuusela, Markku Tamminen, Jukka Veilahti, Jari Arkko, Nassim Bouteldja:
XC - A Language for Embedded Rule Based Systems. ACM SIGPLAN Notices 22(9): 23-32 (1987)
Conference and Workshop Papers
- 2024
- [c14]Jari Arkko, Dag Lindbo, Martin Klitte:
Do Large Language Models Dream of Sockets? ANRW 2024 - 2020
- [c13]Joel Reijonen, Miljenko Opsenica, Tero Kauppinen, Miika Komu, Jimmy Kjällman, Tomas Mecklin, Eero Hiltunen, Jari Arkko, Timo Simanainen, Mohammed Elmusrati:
Benchmarking Q-Learning Methods for Intelligent Network Orchestration in the Edge. 6G SUMMIT 2020: 1-5 - 2015
- [c12]Jari Arkko, Karl Norrman, Mats Näslund, Bengt Sahlin:
A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy. TrustCom/BigDataSE/ISPA (1) 2015: 1205-1209 - 2012
- [c11]Mohit Sethi, Jari Arkko, Ari Keränen:
End-to-end security for sleepy smart object networks. LCN Workshops 2012: 964-972 - 2006
- [c10]Bengt Ahlgren, Jari Arkko, Lars Eggert, Jarno Rajahalme:
A Node Identity Internetworking Architecture. INFOCOM 2006 - 2005
- [c9]Jari Arkko, Pekka Nikander, Mats Näslund:
Enhancing Privacy with Shared Pseudo Random Sequences. Security Protocols Workshop 2005: 187-196 - 2004
- [c8]Pasi Eronen, Jari Arkko:
Authentication Components: Engineering Experiences and Guidelines. Security Protocols Workshop 2004: 68-77 - 2003
- [c7]Jari Arkko, Pekka Nikander:
Limitations of IPsec Policy Mechanisms. Security Protocols Workshop 2003: 241-251 - [c6]Jari Arkko:
Limitations of IPsec Policy Mechanisms (Discussion). Security Protocols Workshop 2003: 252-254 - 2002
- [c5]Tuomas Aura, Michael Roe, Jari Arkko:
Security of Internet Location Management. ACSAC 2002: 78-87 - [c4]Jari Arkko, Pekka Nikander:
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties. Security Protocols Workshop 2002: 5-19 - [c3]Pekka Nikander, Jari Arkko:
Delegation of Signalling Rights. Security Protocols Workshop 2002: 203-214 - [c2]Jari Arkko, Tuomas Aura, James Kempf, Vesa-Matti Mäntylä, Pekka Nikander, Michael Roe:
Securing IPv6 neighbor and router discovery. Workshop on Wireless Security 2002: 77-86 - 1993
- [c1]Jari Arkko:
On the Existence and Production of State Identification Machines for Labelled Transition Systems. FORTE 1993: 351-366
Editorship
- 2009
- [e1]Jari Arkko, Marcelo Bagnulo Braun, Scott Brim, Lars Eggert, Christian Vogt, Lixia Zhang:
Perspectives Workshop: Naming and Addressing in a Future Internet, 01.03. - 04.03.2009. Dagstuhl Seminar Proceedings 09102, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents]
Informal and Other Publications
- 2024
- [i58]Jari Arkko, Colin S. Perkins, Suresh Krishnan:
Report from the IAB Workshop on Environmental Impact of Internet Applications and Systems, 2022. RFC 9547: 1-21 (2024) - 2023
- [i57]Jari Arkko, Ted Hardie, Tommy Pauly, Mirja Kühlewind:
Considerations on Application - Network Collaboration Using Path Signals. RFC 9419: 1-15 (2023) - 2022
- [i56]Jari Arkko, Anders Eriksson, Ari Keränen:
Building Power-Efficient Constrained Application Protocol (CoAP) Devices for Cellular Networks. RFC 9178: 1-14 (2022) - 2021
- [i55]Jari Arkko, Ted Hardie:
Report from the IAB Workshop on Design Expectations vs. Deployment Reality in Protocol Development. RFC 8980: 1-16 (2021) - [i54]Jari Arkko, Cullen Jennings, Zach Shelby:
Uniform Resource Names for Device Identifiers. RFC 9039: 1-15 (2021) - [i53]Jari Arkko, Vesa Lehtovirta, Vesa Torvinen, Pasi Eronen:
Improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA'). RFC 9048: 1-40 (2021) - [i52]Jari Arkko, Stephen Farrell, Mirja Kühlewind, Colin Perkins:
Report from the IAB COVID-19 Network Impacts Workshop 2020. RFC 9075: 1-20 (2021) - [i51]Kim Davies, Jari Arkko:
Nameservers for the Address and Routing Parameter Area ("arpa") Domain. RFC 9120: 1-7 (2021) - 2020
- [i50]Jari Arkko, Ted Hardie:
Update to the Process for Selection of Trustees for the IETF Trust. RFC 8714: 1-6 (2020) - [i49]Jari Arkko:
IETF Administrative Support Activity 2.0: Update to the Process for Selection of Trustees for the IETF Trust. RFC 8715: 1-6 (2020) - 2019
- [i48]Jari Arkko, Ted Hardie:
Update to the Telephony Routing over IP (TRIP) IANA Registry Rules regarding Postal Addresses. RFC 8602: 1-3 (2019) - 2018
- [i47]Mohit Sethi, Jari Arkko, Ari Keränen, Heidi-Maria Back:
Practical Considerations and Implementation Experiences in Securing Smart Object Networks. RFC 8387: 1-33 (2018) - [i46]Cullen Jennings, Zach Shelby, Jari Arkko, Ari Keränen, Carsten Bormann:
Sensor Measurement Lists (SenML). RFC 8428: 1-54 (2018) - 2017
- [i45]Thomas R. Henderson, Christian Vogt, Jari Arkko:
Host Mobility with the Host Identity Protocol. RFC 8046: 1-37 (2017) - [i44]Thomas R. Henderson, Christian Vogt, Jari Arkko:
Host Multihoming with the Host Identity Protocol. RFC 8047: 1-22 (2017) - 2015
- [i43]Hannes Tschofenig, Jari Arkko, David Thaler, Danny McPherson:
Architectural Considerations in Smart Object Networking. RFC 7452: 1-24 (2015) - [i42]Acee Lindem, Jari Arkko:
OSPFv3 Autoconfiguration. RFC 7503: 1-15 (2015) - [i41]Pierre Pfister, Benjamin Paterson, Jari Arkko:
Distributed Prefix Assignment Algorithm. RFC 7695: 1-20 (2015) - 2014
- [i40]Tim Chown, Jari Arkko, Anders Brandt, Ole Troan, Jason Weil:
IPv6 Home Networking Architecture Principles. RFC 7368: 1-49 (2014) - 2013
- [i39]Ari Keränen, Jari Arkko:
Some Measurements on World IPv6 Day from an End-User Perspective. RFC 6948: 1-11 (2013) - [i38]Jouni Korhonen, Jari Arkko, Teemu Savolainen, Suresh Krishnan:
IPv6 for Third Generation Partnership Project (3GPP) Cellular Hosts. RFC 7066: 1-20 (2013) - 2012
- [i37]Hannes Tschofenig, Jari Arkko:
Report from the Smart Object Workshop. RFC 6574: 1-32 (2012) - [i36]Jari Arkko, Ari Keränen:
Experiences from an IPv6-Only Network. RFC 6586: 1-21 (2012) - [i35]Jari Arkko, Lars Eggert, Mark Townsley:
Scalable Operation of Address Translators with Per-Interface Bindings. RFC 6619: 1-9 (2012) - [i34]Victor Fajardo, Jari Arkko, John Loughney, Glen Zorn:
Diameter Base Protocol. RFC 6733: 1-152 (2012) - 2011
- [i33]Jari Arkko, Mark Townsley:
IPv4 Run-Out and IPv4-IPv6 Co-Existence Scenarios. RFC 6127: 1-20 (2011) - [i32]Jari Arkko, Fred Baker:
Guidelines for Using IPv6 Transition Mechanisms during IPv6 Deployment. RFC 6180: 1-20 (2011) - [i31]Charles E. Perkins, David B. Johnson, Jari Arkko:
Mobility Support in IPv6. RFC 6275: 1-169 (2011) - [i30]Jari Arkko, Ari Keränen, John Preuß Mattsson:
IANA Rules for MIKEY (Multimedia Internet KEYing). RFC 6309: 1-6 (2011) - 2010
- [i29]Jari Arkko, Michelle Cotton, Leo Vegoda:
IPv4 Address Blocks Reserved for Documentation. RFC 5737: 1-4 (2010) - [i28]Jari Arkko, Scott O. Bradner:
IANA Allocation Guidelines for the IPv6 Routing Header. RFC 5871: 1-3 (2010) - [i27]Jari Arkko, Alper E. Yegin:
IANA Rules for the Protocol for Carrying Authentication for Network Access (PANA). RFC 5872: 1-5 (2010) - 2009
- [i26]Jari Arkko, Marcelo Bagnulo Braun, Scott Brim, Lars Eggert, Christian Vogt, Lixia Zhang:
09102 Abstracts Collection - Perspectives Workshop: Naming and Addressing in a Future Internet. Perspectives Workshop: Naming and Addressing in a Future Internet 2009 - [i25]Jari Arkko, Marcelo Bagnulo Braun, Scott Brim, Lars Eggert, Christian Vogt, Lixia Zhang:
09102 Report - Perspectives Workshop: Naming and Addressing in a Future Internet. Perspectives Workshop: Naming and Addressing in a Future Internet 2009 - [i24]Jari Arkko, Vesa Lehtovirta, Pasi Eronen:
Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA'). RFC 5448: 1-29 (2009) - [i23]Jari Arkko, Carlos Pignataro:
IANA Allocation Guidelines for the Address Resolution Protocol (ARP). RFC 5494: 1-7 (2009) - [i22]Jari Arkko, Iljitsch van Beijnum:
Failure Detection and Locator Pair Exploration Protocol for IPv6 Multihoming. RFC 5534: 1-36 (2009) - 2008
- [i21]Jari Arkko, Bernard Aboba, Jouni Korhonen, Farooq Bari:
Network Discovery and Selection Problem. RFC 5113: 1-39 (2008) - [i20]Pekka Nikander, Thomas R. Henderson, Christian Vogt, Jari Arkko:
End-Host Mobility and Multihoming with the Host Identity Protocol. RFC 5206: 1-40 (2008) - [i19]Jari Arkko, Scott O. Bradner:
IANA Allocation Guidelines for the Protocol Field. RFC 5237: 1-5 (2008) - 2007
- [i18]Christian Vogt, Jari Arkko:
A Taxonomy and Analysis of Enhancements to Mobile IPv6 Route Optimization. RFC 4651: 1-31 (2007) - [i17]Jari Arkko, Christian Vogt, Wassim Haddad:
Enhanced Route Optimization for Mobile IPv6. RFC 4866: 1-54 (2007) - [i16]Marcelo Bagnulo, Jari Arkko:
Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs). RFC 4982: 1-9 (2007) - 2006
- [i15]Jari Arkko, Henry Haverinen:
Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). RFC 4187: 1-79 (2006) - [i14]Jari Arkko, Fredrik Lindholm, Mats Näslund, Karl Norrman, Elisabetta Carrara:
Key Management Extensions for Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP). RFC 4567: 1-30 (2006) - [i13]Marcelo Bagnulo, Jari Arkko:
Cryptographically Generated Addresses (CGA) Extension Field Format. RFC 4581: 1-4 (2006) - 2005
- [i12]Jari Arkko, James Kempf, Brian Zill, Pekka Nikander:
SEcure Neighbor Discovery (SEND). RFC 3971: 1-56 (2005) - [i11]Vesa Torvinen, Jari Arkko, Mats Näslund:
Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2. RFC 4169: 1-13 (2005) - [i10]Pekka Nikander, Jari Arkko, Tuomas Aura, Gabriel Montenegro, Erik Nordmark:
Mobile IP Version 6 Route Optimization Security Design Background. RFC 4225: 1-37 (2005) - [i9]Bernard Aboba, Mark A. Beadles, Jari Arkko, Pasi Eronen:
The Network Access Identifier. RFC 4282: 1-16 (2005) - 2004
- [i8]David B. Johnson, Charles E. Perkins, Jari Arkko:
Mobility Support in IPv6. RFC 3775: 1-165 (2004) - [i7]Jari Arkko, Vijay Devarapalli, Francis Dupont:
Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents. RFC 3776: 1-40 (2004) - [i6]Jari Arkko, Elisabetta Carrara, Fredrik Lindholm, Mats Näslund, Karl Norrman:
MIKEY: Multimedia Internet KEYing. RFC 3830: 1-66 (2004) - 2003
- [i5]Jari Arkko, Gerben Kuijpers, Hesham Soliman, John Loughney, Juha Wiljakka:
Internet Protocol Version 6 (IPv6) for Some Second and Third Generation Cellular Hosts. RFC 3316: 1-22 (2003) - [i4]Jari Arkko, Vesa Torvinen, Gonzalo Camarillo, Aki Niemi, Tao Haukka:
Security Mechanism Agreement for the Session Initiation Protocol (SIP). RFC 3329: 1-24 (2003) - [i3]Pat R. Calhoun, John Loughney, Erik Guttman, Glen Zorn, Jari Arkko:
Diameter Base Protocol. RFC 3588: 1-147 (2003) - 2002
- [i2]Aki Niemi, Jari Arkko, Vesa Torvinen:
Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA). RFC 3310: 1-18 (2002) - 2000
- [i1]Bernard Aboba, Jari Arkko, Dave Harrington:
Introduction to Accounting Management. RFC 2975: 1-54 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-29 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint