Jialiu Lin, Shahriyar Amini, Jason Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang.
Expectation and Purpose:
Understanding Users’ Mental Models of Mobile App Privacy through Crowdsourcing to appear in UbiComp - 14th International Conference on Ubiquitous Computing, September 5-8, 2012.
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Rich Howard, Janne Lindqvist, Predrag Spasojevic, and Jeffrey Walling. Distinguishing Users with Capacitive Touch Communication to appear in MobiCom - the 18th Annual International Conference on Mobile Computing and Networking, August 22-26, 2012.
[C.1] Shahriyar Amini, Janne Lindqvist, Jason Hong, Jialiu Lin, Eran Toch and Norman Sadeh. Caché: Caching Location-Enhanced Content to Improve User Privacy , to appear in MobiSys 2011: the 9th International Conference on Mobile Systems, Applications and Services, District of Columbia, USA, June 28 - July 1, 2011.
[C.2] Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jason Hong and John Zimmerman. I'm the Mayor of My House: Examining Why People Use foursquare - a Social-Driven Location Sharing Application, in CHI: the 29th ACM Conference on Human Factors in Computing, Vancouver, BC, Canada, May 7-12, 2011.
[C.3] Janne Lindqvist and Jason Hong. Undistracted Driving: A Mobile Phone that Doesn't Distract, in HotMobile 2011: 12th Workshop on Mobile Computing Systems and Applications, Phoenix, Arizona, USA, March 1-2, 2011.
[C.4] Harold Gonzales, Kevin Bauer, Janne Lindqvist, Damon McCoy, and Douglas Sicker, Practical Defenses for Evil Twin Attacks in 802.11, in the IEEE Globecom Communications and Information Security Symposium, Miami, FL, USA, December 6-10, 2010.
[C.5] Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki and Michael Roe, Privacy-Preserving 802.11 Access-Point Discovery, in the 2nd ACM Conference on Wireless Network Security - WiSec09, Zürich, Switzerland, March 16-18, 2009. See also the full version as Microsoft Research Tech Report.
[C.6] Miika Komu and Janne Lindqvist, Leap-of-Faith Security is Enough for Mobility, in the 6th Annual IEEE Consumer Communications & Networking Conference - IEEE CCNC 2009, Las Vegas, Nevada, USA, January 10-13, 2009.
[C.7] Janne Lindqvist and Juha-Matti Tapio, Protecting Privacy with Protocol Stack Virtualization, in the 7th ACM CCS Workshop on Privacy in Electronic Society - WPES 2008, Alexandria, Virginia, USA, October 27, 2008.
[C.8] Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed, Chattering Laptops, in proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS), Leuven, Belgium, July 23-25, 2008.
[C.9] Anu Markkola and Janne Lindqvist, Accessible Voice CAPTCHAs for Internet Telephony, in the Symposium on Accessible Privacy and Security (SOAPS ’08) part of 2008 Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, July 23, 2008.
[C.10] Chittaranjan Hota, Janne Lindqvist, Kristiina Karvonen, Antti Ylä-Jääski, and .K.J Mohan, Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing, in International Conference on Networking, Architecture, and Storage, 2007 (NAS 2007), Guilin, China, July 29-31, 2007.
[C.11] Anton Alstes and Janne Lindqvist, Learning Routing and Network Programming Online, in Proceedings of 12th Annual Conference on Innovation and Technology in Computer Science Education - ITiCSE 2007, Dundee, Scotland, UK, June 25-27, 2007.
[C.12] Kristiina Karvonen and Janne Lindqvist, Usability Improvements for WLAN Access, in Proceedings of 12th International Conference on Human-Computer Interaction - HCI International 2007, Beijing, China, July 22-27, 2007.
[C.13] Janne Lindqvist and Miika Komu, Cure for Spam over Internet Telephony, in Proceedings of the 4th IEEE Consumer Communications and Networking Conference - IEEE CCNC 2007, Las Vegas, Nevada, USA, January 11-13, 2007.
[C.14] Janne Lindqvist, IPv6 Stateless Address Autoconfiguration Considered Harmful, in Proceedings of the Military Communications Conference - MILCOM 2006, Washington, DC, USA, Oct. 23-25, 2006.
[C.15] Janne Lindqvist and Laura Takkinen, Privacy Management for Secure Mobility, in Proceedings of the 5th ACM CCS Workshop on Privacy in Electronic Society - WPES 2006, Alexandria VA, USA, October 30, 2006.
[C.16] Janne Lindqvist, Antti Ylä-Jääski and Jukka Manner, Resilient IPv6 Multicast Address Allocation in Ad Hoc Networks, in Proceedings of the 2006 IEEE International Workshop on Wireless Ad-hoc and Sensor Networks - IWWAN 2006, New York, June 28-30, 2006.
[C.17] Janne Lindqvist, Sanna Liimatainen and Tuomo Katajamäki, Secure Pairing Architecture for Wireless Mobile Devices, in Proceedings of IEEE 63rd Vehicular Technology Conference - IEEE VTC 2006 Spring, Melbourne, Australia, May 7-10, 2006.
[C.18] Janne Lindqvist and Sasu Tarkoma, Protecting Internet Connectivity of Hybrid Ad Hoc Network Gateways, MiNEMA Workshop3, Leuven, Belgium, February 6-7, 2006.
[C.19] Janne Lindqvist, Micro Mobility Routing and Multicasting in Hybrid Ad Hoc Networks, in Proceedings of IEE Mobility Conference 2005, Guangzhou, China, November 15-17, 2005.
[C.20] Mikko Martsola, Timo Kiravuo and Janne Lindqvist, Machine to Machine Communication in Cellular Networks, in Proceedings of IEE Mobility Conference 2005, Guangzhou, China, November 15 -17, 2005.
[C.21] Janne Lindqvist, Suspend Mode Mobility Management Problem, in Proceedings of the 6th IEE International Conference on 3G and Beyond - IEE 3G 2005, London, November 7-9, 2005.
[J.1] Janne Lindqvist, Essi Vehmersalo, Miika Komu and Jukka Manner, Enterprise Network Packet Filtering for Mobile Cryptographic Identities, in the International Journal of Handheld Computing Research (IJHCR), January-March, 2010.
[BC.1] Janne Lindqvist, Yksityisyyden suoja verkottuneessa yhteiskunnassa (Privacy Protection in Networked Society), a book chapter in Finnish in a book on information society pub- lished in the Parliament of Finland’s Committee for the Future report series 1/2008, ISBN 978-951-53-3043-7.
[M.1] Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Maladau Mou, Rahul Raheja, Jialiu Lin, Norman Sadeh, and Eran Toch. MobiCom 2010 Poster: Caché: Caching Location-Enhanced Content to Improve
User Privacy, to appear in Mobile Computing and Communications Review.
[M.2] Janne Lindqvist, Pravin Pawar and Erich Stuntebeck, HotMobile 2008: Postconference Report, in IEEE Pervasive Computing Magazine, 2008.
[PS.1] Janne Lindqvist, WLAN kertoo, missä liikut, Tietosuoja, 1/2009.
[PS.2] Janne Lindqvist, Yksityisyyden suoja langattomissa verkoissa, Hetky, 1/2009.
[P.1] Janne Lindqvist and Jason Hong, Mitigating Mobile Phone Distractions While Driving,
one page abstract in adjunct proceedings of 2nd International Conference on Automotive User Interfaces and Interactive Vehicular Applications (AutomotiveUI 2010).
[P.2] Janne Lindqvist. Wireless Privacy for the First User? Hot Topics in Privacy Enhancing Technologies, Seattle, WA, USA, August 5-7, 2009.
[P.3] Janne Lindqvist and Juha-Matti Tapio, Protecting Privacy with Protocol Stack Virtualization, Hot Topics in Privacy Enhancing Technologies, Leuven, Belgium, July 23-25, 2008.
[P.4] Janne Lindqvist, System-Wide Privacy Protection for Mobile Computers, in Hotmobile 2008 Doctoral Consortium, Silverado Resort, Napa Valley, CA, USA, February 25-26, 2008.
[P.5] Janne Lindqvist, Privacy in Networked Mobile Device Configuration, in Doctoral Colloquium at the 9th International Conference on Ubiquitous Computing (UbiComp 2007-DC), September 16, 2007, Innsbruck, Austria.
[P.6] Janne Lindqvist, Privacy-Preserving WLAN Access Point Discovery, 16th USENIX Security Symposium, Boston, MA, August 6-10, 2007.
[P.7] Janne Lindqvist, Essi Vehmersalo, Miika Komu and Jukka Manner, Enterprise Network Packet Filtering for Mobile Cryptographic Identities, two-page abstract presented in the posters session at the Usenix 2007 Annual Technical Conference, Santa Clara, CA, June 20, 2007.
[P.8] Janne Lindqvist and Sanna Liimatainen, VERKKOKE: Online Teaching Environment for Telecommunications Software and Routing, Poster presentation in The Eleventh Annual Conference on Innovation and Technology in Computer Science Education University of Bologna, Italy June 26-28 2006.
[TR.1] Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi,
Jussi Mäki and Michael Roe, Privacy-Preserving 802.11 Access-Point Discovery (full version), Microsoft Research Technical Report, January
[TR.2] Petri Kärhä, Jaakko Hollmen, Satu Karling, Jaakko Kujala, Petri Kuosmanen and Janne Lindqvist, Opinnäytetyön ohjaus Teknillisessä korkeakoulussa, Helsinki University of Technology Metrology Research Institute Report 28/2005.
[TR.3] Teemu Koponen, Janne Lindqvist, Niklas Karlsson, Essi Vehmersalo, Miika Komu, Mika Kousa, Dmitri Korzun and Andrei Gurtov, Overview and Comparison Criteria for the Host Identity Protocol and Related Technologies, Technical Report, February 2005.
[ID.1] Janne Lindqvist, Piggybacking TCP to Host Identity Protocol (draft-lindqvist-hip-tcp-piggybacking-00.txt), IETF, Internet-Draft, July 11, 2006, work in progress, Expired: January 12, 2007.
[ID.2] Janne Lindqvist, Establishing Host Identity Protocol Opportunistic Mode with TCP Option (draft-lindqvist-hip-opportunistic-01.txt), IETF, Internet-Draft, March 6, 2006, work in progress, Expired: September 7, 2006.