-
1
-
-
84880745230
-
A lightweight framework for secure life-logging in smart environments
-
N. Petroulakis, et al., "A lightweight framework for secure life-logging in smart environments," Information Security Technical Report, 2012.
-
(2012)
Information Security Technical Report
-
-
Petroulakis, N.1
-
2
-
-
84880712339
-
Secure and energy-efficient life-logging in wireless pervasive environments
-
Privacy, and Trust. Springer
-
A. Fragkiadakis, et al., "Secure and energy-efficient life-logging in wireless pervasive environments," in Human Aspects of Information Security, Privacy, and Trust. Springer, 2013, pp. 306-315.
-
(2013)
Human Aspects of Information Security
, pp. 306-315
-
-
Fragkiadakis, A.1
-
3
-
-
84881318163
-
Spectrum assignment in cognitive radio networks: A comprehensive survey
-
E. Tragos, et al., "Spectrum assignment in cognitive radio networks: A comprehensive survey," IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 1108-1135, 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.3
, pp. 1108-1135
-
-
Tragos, E.1
-
4
-
-
84872871627
-
Security in cognitive wireless sensor networks. Challenges and open problems
-
A. Araujo et al., "Security in cognitive wireless sensor networks. challenges and open problems," Journal on Wireless Communications and Networking, vol. 48, 2012.
-
(2012)
Journal on Wireless Communications and Networking
, vol.48
-
-
Araujo, A.1
-
5
-
-
84873711287
-
A survey on security threats and detection techniques in cognitive radio networks
-
A. Fragkiadakis, E. Tragos, and I. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks," IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 428-445, 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.3
, pp. 428-445
-
-
Fragkiadakis, A.1
Tragos, E.2
Askoxylakis, I.3
-
6
-
-
84875051385
-
A highly scalable key pre-distribution scheme for wireless sensor networks
-
W. Bechkit, et al, "A highly scalable key pre-distribution scheme for wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 12, no. 2, pp. 948-959, 2013.
-
(2013)
Wireless Communications, IEEE Transactions on
, vol.12
, Issue.2
, pp. 948-959
-
-
Bechkit, W.1
-
7
-
-
79955712919
-
Key management systems for sensor networks in the context of the Internet of Things
-
Mar.
-
R. Roman, et al., "Key management systems for sensor networks in the context of the Internet of Things," Computers & Electrical Engineering, vol. 37, no. 2, pp. 147-159, Mar. 2011.
-
(2011)
Computers & Electrical Engineering
, vol.37
, Issue.2
, pp. 147-159
-
-
Roman, R.1
-
8
-
-
84884404306
-
Cryptographic key exchange in ipv6-based low power, lossy networks
-
ser. Lecture Notes in Computer Science. Springer, May
-
P. Ilia, G. Oikonomou, and T. Tryfonas, "Cryptographic key exchange in ipv6-based low power, lossy networks," in Proc. of WISTP '13), ser. Lecture Notes in Computer Science. Springer, May 2013, pp. 34-49.
-
(2013)
Proc. of WISTP '13)
, pp. 34-49
-
-
Ilia, P.1
Oikonomou, G.2
Tryfonas, T.3
-
9
-
-
4444219556
-
-
"802.15.4-2006: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for Low Rate Wireless Personal Area Networks (LR-WPANs)," IEEE Standard, 2011.
-
(2011)
IEEE Standard
-
-
-
10
-
-
80052447165
-
Securing Communication in 6LoWPAN with Compressed IPsec
-
Jun.
-
S. Raza, et al., "Securing Communication in 6LoWPAN with Compressed IPsec," in Proc. 7th IEEE DCOSS '11), Jun. 2011.
-
(2011)
Proc. 7th IEEE DCOSS '11)
-
-
Raza, S.1
-
11
-
-
79959516675
-
Public-key based access control in sensornet
-
H. Wang, et al., "Public-key based access control in sensornet," Wireless Networks, vol. 17, no. 5, pp. 1217-1234, 2011.
-
(2011)
Wireless Networks
, vol.17
, Issue.5
, pp. 1217-1234
-
-
Wang, H.1
-
12
-
-
84871369628
-
Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography
-
R. Mzid, et al, "Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography," in Int. Conf. on ICWUS '10), 2010, pp. 1-8.
-
(2010)
Int. Conf. on ICWUS '10)
, pp. 1-8
-
-
Mzid, R.1
-
13
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Support Syst., vol. 43, no. 2, pp. 618-644, 2007.
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
14
-
-
84871767830
-
Towards a theory of trust in networks of humans and computers
-
ser. LNCS. Springer Verlag
-
V. Gligor and J. M. Wing, "Towards a theory of trust in networks of humans and computers," in 19th Int. Workshop on Security Protocols, ser. LNCS. Springer Verlag, 2011.
-
(2011)
19th Int. Workshop on Security Protocols
-
-
Gligor, V.1
Wing, J.M.2
-
15
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, et al., "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
-
16
-
-
33745801618
-
Securing XML data in thirdparty distribution systems
-
B. Carminati, E. Ferrari, and E. Bertino, "Securing XML data in thirdparty distribution systems," in ACM CIKM, 2005, pp. 99-106.
-
(2005)
ACM CIKM
, pp. 99-106
-
-
Carminati, B.1
Ferrari, E.2
Bertino, E.3
-
17
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
B. Gedik and L. Liu, "Location privacy in mobile systems: A personalized anonymization model," in Proc. of 25th IEEE ICDCS '05. IEEE, 2005, pp. 620-629.
-
(2005)
Proc. of 25th IEEE ICDCS '05. IEEE
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
18
-
-
33646059204
-
Sanitizable signatures
-
Springer
-
G. Ateniese et al., "Sanitizable signatures," in Proc. of 10th ESORICS '05. Springer, 2005, pp. 159-177.
-
(2005)
Proc. of 10th ESORICS '05
, pp. 159-177
-
-
Ateniese, G.1
-
19
-
-
23044534452
-
Content extraction signatures
-
Springer
-
R. Steinfeld, L. Bull, and Y. Zheng, "Content extraction signatures," in Proc. of 4th ICISC '01, vol. 2288. Springer, 2002, pp. 163-205.
-
(2002)
Proc. of 4th ICISC '01
, vol.2288
, pp. 163-205
-
-
Steinfeld, R.1
Bull, L.2
Zheng, Y.3
-
20
-
-
84912025051
-
-
ISO/IEC Standard
-
"7498-2: Information processing systems-Open Systems Interconnection-Basic Reference Model-Part 2: Security Architecture," ISO/IEC Standard, 1989.
-
(1989)
-
-
-
21
-
-
84863496164
-
Veracity, plausibility, and reputation
-
Berlin, Heidelberg: Springer-Verlag
-
D. Gollmann, "Veracity, plausibility, and reputation," in Proc. of WISTP'12. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 20-28.
-
(2012)
Proc. of WISTP'12
, pp. 20-28
-
-
Gollmann, D.1
-
23
-
-
84861997111
-
Survey paper internet of things: Vision, applications and research challenges
-
Elsevier
-
D. Miorandi, et al., "Survey paper internet of things: Vision, applications and research challenges," in Ad Hoc Networks, vol. 10. Elsevier, 2012.
-
(2012)
Ad Hoc Networks
, vol.10
-
-
Miorandi, D.1
-
24
-
-
77955203039
-
A framework to enforce access control over data streams
-
B. Carminati, et al., "A framework to enforce access control over data streams," ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 3, p. 28, 2010.
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.3
, pp. 28
-
-
Carminati, B.1
-
25
-
-
47249114835
-
SEDAN: Secure and efficient protocol for data aggregation in wireless sensor networks
-
M. Bagaa et al., "SEDAN: secure and efficient protocol for data aggregation in wireless sensor networks," in Proc. of IEEE LCN. IEEE, 2007, pp. 1053-1060.
-
(2007)
Proc. of IEEE LCN. IEEE
, pp. 1053-1060
-
-
Bagaa, M.1
-
28
-
-
42549159545
-
Public key based cryptoschemes for data concealment in wireless sensor networks
-
September
-
E. Mykletun, J. Girao, and D. Westhoff, "Public key based cryptoschemes for data concealment in wireless sensor networks," in Proc. of IEEE ICC'06. IEEE, September 2006, pp. 2288-2295.
-
(2006)
Proc. of IEEE ICC'06. IEEE
, pp. 2288-2295
-
-
Mykletun, E.1
Girao, J.2
Westhoff, D.3
-
29
-
-
84876943063
-
Internet of things (iot): A vision, architectural elements, and future directions
-
Elsevier, September
-
J. Gubbi, et al., "Internet of Things (IoT): A vision, architectural elements, and future directions," in Future Generation Computer Systems, vol. 29. Elsevier, September 2013, pp. 1645-1660.
-
(2013)
Future Generation Computer Systems
, vol.29
, pp. 1645-1660
-
-
Gubbi, J.1
-
30
-
-
79952637538
-
Adjacent channel interference in 802.11a is harmful: Testbed validation of a simple quantification model
-
V. Angelakis et al., "Adjacent channel interference in 802.11a is harmful: Testbed validation of a simple quantification model," IEEE Commun. Mag., vol. 49, no. 3, pp. 160-166, 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.3
, pp. 160-166
-
-
Angelakis, V.1
-
31
-
-
84949499258
-
Cognitive radio inspired m2m communications (invited paper)
-
Jun.
-
E. Tragos and V. Angelakis, "Cognitive Radio Inspired M2M Communications (Invited Paper)," in Proc. IEEE GWS 2013, Jun. 2013.
-
(2013)
Proc. IEEE GWS 2013
-
-
Tragos, E.1
Angelakis, V.2
-
32
-
-
80054071793
-
FI-ware security: Future internet security core
-
Springer Berlin Heidelberg
-
A. Garcia, et al., "FI-WARE Security: Future Internet Security Core," in Towards a Service-Based Internet, ser. Lecture Notes in Computer Science, vol. 6994. Springer Berlin Heidelberg, 2011, pp. 144-152.
-
(2011)
Towards A Service-Based Internet, Ser. Lecture Notes in Computer Science
, vol.6994
, pp. 144-152
-
-
Garcia, A.1
-
34
-
-
67049155506
-
Security of sanitizable signatures revisited
-
Berlin, Heidelberg: Springer-Verlag
-
C. Brzuska, et al., "Security of sanitizable signatures revisited," in Proc. PKC 2009. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 317-336.
-
(2009)
Proc. PKC 2009
, pp. 317-336
-
-
Brzuska, C.1
-
35
-
-
84912041069
-
Efficient and perfectly unlinkable sanitizable signatures without group signatures
-
ser. LNCS. Springer
-
C. Brzuska, H. C. Pohls, and K. Samelin, "Efficient and perfectly unlinkable sanitizable signatures without group signatures," in Proc. of EuroPKI 2013, ser. LNCS. Springer, 2013.
-
(2013)
Proc. of EuroPKI 2013
-
-
Brzuska, C.1
Pohls, H.C.2
Samelin, K.3
-
36
-
-
84912008687
-
Design considerations for a cognitive radio trust and security framework
-
A. Mihovska et al., "Design considerations for a cognitive radio trust and security framework," in IEEE CAMAD 2012, 2012.
-
(2012)
IEEE CAMAD 2012
-
-
Mihovska, A.1
-
38
-
-
84871266331
-
RPL: IPv6 routing protocol for low power and lossy networks
-
Mar.
-
T. Winter, et al., "RPL: IPv6 Routing Protocol for Low power and Lossy Networks," RFC 6550, Mar. 2012.
-
(2012)
RFC
, vol.6550
-
-
Winter, T.1
-
39
-
-
78650911380
-
Constrained application protocol (CoAP)
-
Jun. , (draft-ietf-core-coap-18).
-
Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol (CoAP)," Internet Draft, Jun. 2013, (draft-ietf-core-coap-18).
-
(2013)
Internet Draft
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
40
-
-
84901332371
-
Enabling reliable and secure iot-based smart city applications
-
to be published
-
E. Tragos, et al., "Enabling Reliable and Secure IoT-based Smart City Applications," in IEEE PerCity' 14, 2014, to be published.
-
(2014)
IEEE PerCity' 14
-
-
Tragos, E.1
|