Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marko Hassinen is active.

Publication


Featured researches published by Marko Hassinen.


international symposium on wireless communication systems | 2005

Strong mobile authentication

Marko Hassinen; K. Hypponen

Our main contribution is a protocol that provides strong mobile authentication with non-repudiation using SMS messages. For ensuring these properties, governmentally controlled PKI, and SIM cards with electronic identity application are used. Moreover, our protocol provides confidentiality and integrity of transferred content. An application that implements this protocol was developed and tested in a partly simulated environment. Furthermore, we developed a protocol for mobile payment for vending machines. In comparison to current systems, this protocol contains several enhancements in security, usability and cost both from the client as well as from the service provider point of view.


international conference on information and communication technologies | 2006

Java based Public Key Infrastructure for SMS Messaging

Marko Hassinen

Mobile commerce is a field with a huge potential for new applications. One of the most important aspects in such applications is security. The main contribution of this paper is an implementation of a public key cryptosystem for short messages in a mobile phone network. Our system provides confidentiality, integrity and non-repudiation of SMS messages, which makes it possible to use SMS messaging in mobile commerce. The system can be set up with a very simple infrastructure using free software and has very low total cost of ownership.


international conference on telecommunications | 2005

SafeSMS - end-to-end encryption for SMS

Marko Hassinen

Our main contribution is confidentiality, integrity and authentication in SMS (Short Message Services). We will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware. Also, we will show how to authenticate the sender of a message and how to ensure that the message has not been tampered with. Programming language Java is used for the realization of our goals. This paper describes the application solution, while details for the encryption methods are described in the referenced articles.


pervasive computing technologies for healthcare | 2006

Disaster Relief Coordination using a Documentation System for Emergency Medical Services

Marko Hassinen; Maija Marttila-Kontio

In our earlier work we introduced a mobile documentation system for emergency medical services. The system delivers more comprehensive and detailed documentation of prehospital care than existing systems. Also, it makes documentation and patient monitoring easier and gives paramedics more time to treat the patient. Technical solutions for implementing the documentation system are described in this paper. Based on our documentation system we introduce a novel system for coordinating resources in disaster medicine. The system utilizes the triage method in prioritizing patients and provides an up-to-date view of the emergency scene. This allows better coordination of relief effort by providing better control over manpower and equipment


international conference on information technology new generations | 2006

Secure Two-Way Transfer of Measurement Data

Marko Hassinen; Maija Marttila-Kontio; Mikko Saesmaa; Heli Tervo

We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement tasks and strong data presentation capabilities through XML techniques. In the architecture, we take advantage of well-tried technologies, like a commonly used visual programming language that offers predefined and adaptive measuring tools for managing measurement devices and tasks. XML is a widely adopted standard for a flexible text format and data exchange. It brings along a vast selection of ready made facilities for processing and transforming the content into any format desired. We also propose a secure environment into the architecture, which can be accessed on demand using a wide range of terminal devices


international conference on pervasive computing | 2008

EMS coordination in large scale emergencies using automated patient monitoring

Marko Hassinen; Maija Marttila-Kontio

In large scale emergencies with very limited work force it is difficult to provide best possible care for all the patients. In these circumstances one has to concentrate to the patients that need the care most and there is usually not enough human resources to monitor those patients that do not require immediate medical care. In this paper we describe an automated monitoring device combined to an automated emergency medical care documentation. Based on the documentation system a coordination information system is created. The coordination system monitors patients, resources and supplies facilitating decision making in the coordination process.


international conference on hybrid information technology | 2008

A Highly Automated Documentation System: Component Design

Marko Hassinen; Maija Marttila-Kontio

Designing component based software has often been considered a paradigm for large scale enterprise software development. There are also evident reasons for this as the most prominent benefits of component based software engineering are usually observed in large and complex applications. However, we feel that applying component based design into mobile applications in resource constrained devices can be very efficient in terms of modifiability, robustness, and time-to-market. This paper discusses a component design of a mobile, highly automated documentation system. Along with the actual design, we focus on the benefits of component based software engineering in our mobile environment and discuss a case study in which a documentation system for emergency medical care is constructed.


international conference on software engineering advances | 2009

A Monolithic Program vs. Modifiability: Enhancing a Visual Data Flow Program with Object-Oriented Techniques

Maija Marttila-Kontio; Marko Hassinen; Mikko Kontio

In this paper, we discuss how object-oriented techniques, such as, data encapsulation and inheritance can enhance modifiability and maintainability of a system that is implemented with a visual data flow programming language (VDFL). The paper is written in the light of our recent research on automated documentation system. A visual data flow program can easily suffer from monolithic program structure. A concept of monolithic program is an opposite to the modularity. Modularity is a well-known approach for improving modifiability and maintainability of systems. Another problem appears when modifying the program code. For example, when adding or removing a program part, several modifications have to be done to other places on the program as well. As a result, the object-oriented techniques can reduce the latter problem but they can not reduce the risk of monolithic program structure.


international conference on applications of digital information and web technologies | 2008

Implementation of an automated documentation system with a visual data flow programming language

Maija Marttila-Kontio; Marko Hassinen

In this article, we present advantages and restrictions that visual data flow programming language (VDFL) brings to a measurement system implementation. These results have been collected together during the implementation of an automated documentation system. Because of the characteristic of VDFL, such as, absence of variables and concreteness of the program code representation the implementation suffers from lack of run-time program variability. In this article, we introduce a dynamic case structure that is a theoretical solution to improve the program variability during execution. The main advantages for using VDFL are prototyping with predefined program components and comprehensibility of the visual language. We also found that the rapid prototyping method combined together with a simple top-down design is a useful tool for a measurement system implementation.


Archive | 2005

SafeSMS - End-to-end encryption for SMS messages

Marko Hassinen

Collaboration


Dive into the Marko Hassinen's collaboration.

Top Co-Authors

Avatar

Maija Marttila-Kontio

University of Eastern Finland

View shared research outputs
Top Co-Authors

Avatar

Antti Lahtela

University of Eastern Finland

View shared research outputs
Top Co-Authors

Avatar

Heli Tervo

University of Eastern Finland

View shared research outputs
Top Co-Authors

Avatar

Mikko Kontio

University of Eastern Finland

View shared research outputs
Top Co-Authors

Avatar

Mikko Saesmaa

University of Eastern Finland

View shared research outputs
Top Co-Authors

Avatar

Virpi Jylhä

University of Eastern Finland

View shared research outputs
Researchain Logo
Decentralizing Knowledge