Kristiina Karvonen

Learn More
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electronics with wireless communication abilities has made the problem more urgent than ever before. During the last few years, several solutions have appeared in the research literature.(More)
Wireless networks are becoming increasingly popular at homes. Today, most wireless home networks are used for Internet access only, but as devices at home become more intelligent, they start to communicate with each other within the home network as well. When this happens, new security concerns will arise. The issue of WLAN link layer security has been well(More)
This paper presents a multicultural comparison on users' perception on computer security issues in Finland, Sweden, and Iceland. Special emphasis is given to the notion of trust: how trusting relations are formed both in an electronic environment, namely, the Internet, as well as outside it, in the real world. A set of user interviews, together with(More)
Helsinki and Vienna had a lot of fun using our prototype " pictorial communicator " for a few weeks. They came up with a few creative applications of their own. We take a look at some of the results. 12 hat do family members do when they have a simple, efficient instrument for sending one another digital pictures? What will they use it for? The Maypole team(More)
In this paper, we describe a study conducted to better understand and improve the usability of the reputation elements on an online widget sharing site called WidSets. With a series of interviews and an online questionnaire with users of WidSets, we seek to understand the motivations and instigators of the actual usage, the level of understanding, and(More)
The use of Voice over IP (VoIP) applications involves a number of security threats and usability issues, leading to possible breaches of security and privacy. With the adoption of future peer-to-peer communication systems, the challenges grow even more as we rely on untrusted peers to access the service. We are developing a peer-to-peer VoIP system which(More)
In this paper, we aim to analyse the current level of usability on ten popular online websites utilising some kind of reputation system. The conducted heuristic and expert evaluations reveal a number of deficiencies on the overall usability of these websites, but especially on how the reputation information is currently presented. The low level of usability(More)
Host Identity Protocol (HIP) proposes a change to the Internet architecture by introducing cryptographically-secured names, called Host Identities (HIs), for hosts. Applications use HIs instead of IP addresses in transport layer connections, which allows applications to tolerate host-based mobility better. HIP provides IPsec-based, lower-layer security, but(More)