-
1
-
-
84915776464
-
-
SenSys, ACM, Roma
-
Bandyopadhyay, S., Bhattacharyya, A. and Pal, A. (2013a), Adapting Sensed Indication for Vehicular Analytics, SenSys, ACM, Roma.
-
(2013)
Adapting Sensed Indication for Vehicular Analytics
-
-
Bandyopadhyay, S.1
Bhattacharyya, A.2
Pal, A.3
-
2
-
-
84877604655
-
Lightweight Internet protocols for web enablement of sensors using constrained gateway devices
-
San Diego, CA
-
Bandyopadhyay, S. and Bhattacharyya, A. (2013a), “Lightweight Internet protocols for web enablement of sensors using constrained gateway devices”, International Conference on Computing, Networking and Communication, IEEE, San Diego, CA, pp. 334-340.
-
(2013)
International Conference on Computing, Networking and Communication, IEEE
, pp. 334-340
-
-
Bandyopadhyay, S.1
Bhattacharyya, A.2
-
4
-
-
84915776462
-
-
Bhattacharyya, A., Bandyopadhyay, S. and Pal, A. (2013b), “CoAP option for no server-response, draft-tcs-coap-no-response-option-04”, available at: http://tools.ietf.org/pdf/draft-tcs-coapno-response-option-04.pdf
-
(2013)
Coap Option for No Server-Response, Draft-Tcs-Coap-No-Response-Option-04
-
-
Bhattacharyya, A.1
Bandyopadhyay, S.2
Pal, A.3
-
5
-
-
84915776461
-
-
Boneh, D. (2012), “Stanford University”, available at: http://crypto.stanford.edu/_dabo/cs255/lectures/PRP-PRF.pdf
-
(2012)
Stanford University
-
-
Boneh, D.1
-
6
-
-
84915802864
-
-
Proceedings of the 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN11), Paderborn
-
Brachmann, M., Garcia-Morchon, O. and Kirsche, M. (2011), “Security for practical CoAP applications: issues and solution approaches”, Proceedings of the 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN11), Paderborn, pp. 15-16.
-
(2011)
Security for Practical Coap Applications: Issues and Solution Approaches
, pp. 15-16
-
-
Brachmann, M.1
Garcia-Morchon, O.2
Kirsche, M.3
-
7
-
-
84890523909
-
-
inExtending the Internet to Low power and Lossy Networks, IPSN
-
Colitti, W., Steenhaut, K. and Caro, N.D. (2011), “Integrating wireless sensor networks with web applications”, in Extending the Internet to Low power and Lossy Networks, IPSN.
-
(2011)
Integrating Wireless Sensor Networks with Web Applications
-
-
Colitti, W.1
Steenhaut, K.2
Caro, N.D.3
-
9
-
-
84883437259
-
Application-layer security for the WoT: Extending CoAP to support end-to-end message security for internet-integrated sensing applications
-
Granjal, J., Monteiro, E. and Silva, J.S. (2013), “Application-layer security for the WoT: extending CoAP to support end-to-end message security for internet-integrated sensing applications”, Lecture Notes in Computer Science, Vol. 7889, pp. 140-153.
-
(2013)
Lecture Notes in Computer Science
, vol.7889
, pp. 140-153
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
12
-
-
79952556868
-
Designing WANem: A wide area network emulator tool
-
IEEE, Bangalore, India
-
Kalitay, H.K. and Nambiarz, M.K. (2011), “Designing WANem: a wide area network emulator tool”, In Communication Systems and Networks (COMSNETS), 2011 Third International Conference on, IEEE, Bangalore, India, pp. 1-4.
-
(2011)
Communication Systems and Networks (COMSNETS), 2011 Third International Conference On
, pp. 1-4
-
-
Kalitay, H.K.1
Nambiarz, M.K.2
-
13
-
-
84861591865
-
Providing hop-by-hop authentication and source privacy in wireless sensor networks
-
IEEE, Orlando, FL
-
Li, Y., Li, J., Ren, J. and Wu, J. (2012), “Providing hop-by-hop authentication and source privacy in wireless sensor networks”, INFOCOM 2012, IEEE, Orlando, FL, pp. 3071-3075.
-
(2012)
INFOCOM 2012
, pp. 3071-3075
-
-
Li, Y.1
Li, J.2
Ren, J.3
Wu, J.4
-
14
-
-
84887332875
-
-
Department of Computer Science Bar-Ilan University, Israel
-
Lindell, Y. (2010), Foundations of Cryptography, Department of Computer Science Bar-Ilan University, Israel.
-
(2010)
Foundations of Cryptography
-
-
Lindell, Y.1
-
17
-
-
84883314073
-
Lithe: Lightweight secure CoAP for the internet of things
-
Raza, S., Shafagh, H., Hewage, K., Hummen, R. and Voigt, T. (2013), “Lithe: lightweight secure CoAP for the internet of things”, IEEE Sensors Journal, Vol. 13 No. 10, pp. 3711-3720.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
18
-
-
84864199559
-
6LoWPAN compressed DTLS for CoAP
-
Hangzhou, China
-
Raza, S., Trabalza, D. and Voigt, T. (2012), “6LoWPAN compressed DTLS for CoAP”, IEEE International Conference on Distributed Computing in Sensor Systems, IEEE 8th International Conference on. IEEE, Hangzhou, China.
-
(2012)
IEEE International Conference on Distributed Computing in Sensor Systems
-
-
Raza, S.1
Trabalza, D.2
Voigt, T.3
-
19
-
-
77952310498
-
A secure routing protocol for wireless sensor networks
-
Sen, J. and Ukil, A. (2010), “A secure routing protocol for wireless sensor networks”, in Computational Science and its Application, ICCSA, Springer, Berlin Heidelberg, Vol. 6018, pp. 277-290.
-
(2010)
Computational Science and Its Application, ICCSA
, vol.6018
, pp. 277-290
-
-
Sen, J.1
Ukil, A.2
-
20
-
-
84901244508
-
Constrained application protocol (CoAP), draft-ietf-core-coap-18
-
Orlando, December
-
Shelby, Z., Hartke, K. and Bormann, C. (2013), “Constrained application protocol (CoAP), draft-ietf-core-coap-18”, The Internet Engineering Task Force–IETF, Orlando, December.
-
(2013)
The Internet Engineering Task Force–IETF
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
21
-
-
78651256956
-
Context protecting privacy preservation in ubiquitous computing
-
2010 International Conference, IEEE
-
Ukil, A. (2010a), “Context protecting privacy preservation in ubiquitous computing”, in Computer Information Systems and Industrial Management Applications, IEEE, (CISIM), 2010 International Conference, IEEE, pp. 273-278.
-
(2010)
Computer Information Systems and Industrial Management Applications, IEEE, (CISIM)
, pp. 273-278
-
-
Ukil, A.1
-
22
-
-
79960293428
-
Security and privacy in wireless sensor networks
-
Intechweb Press, Croatia
-
Ukil, A. (2010b), “Security and privacy in wireless sensor networks”, in Smart Wireless Sensor Networks, Intechweb Press, Croatia, pp. 395-418.
-
(2010)
Smart Wireless Sensor Networks
, pp. 395-418
-
-
Ukil, A.1
-
23
-
-
79551562900
-
Secure multiparty privacy preserving data aggregation by modular arithmetic
-
Ukil, A. and Sen, J. (2010), “Secure multiparty privacy preserving data aggregation by modular arithmetic”, International Conference on Parallel Distributed and Grid Computing, IEEE, pp. 344-349.
-
(2010)
International Conference on Parallel Distributed and Grid Computing, IEEE
, pp. 344-349
-
-
Ukil, A.1
Sen, J.2
-
24
-
-
79955879787
-
Embedded security for internet of things
-
, Shillong
-
Ukil, A., Sen, J. and Koilakonda, S. (2011), “Embedded security for internet of things”, 2nd National Conference on Emerging Trends and Applications in Computer Science, IEEE, Shillong, pp. 1-6.
-
(2011)
2Nd National Conference on Emerging Trends and Applications in Computer Science, IEEE
, pp. 1-6
-
-
Ukil, A.1
Sen, J.2
Koilakonda, S.3
-
25
-
-
85152510858
-
Lightweight security scheme for vehicle tracking system using CoAP
-
Ukil, A., Bandyopadhyay, S., Bhattacharyya, A. and Pal, A. (2013), “Lightweight security scheme for vehicle tracking system using CoAP”, International Workshop on Adaptive Security, UBICOMP, ACM.
-
(2013)
International Workshop on Adaptive Security, UBICOMP, ACM
-
-
Ukil, A.1
Bandyopadhyay, S.2
Bhattacharyya, A.3
Pal, A.4
-
26
-
-
84901328241
-
Auth-Lite: Lightweight M2MAuthentication reinforcing DTLS for CoAP
-
Ukil, A., Bandyopadhyay, S., Bhattacharyya, A. and Pal, A. (2014), “Auth-Lite: lightweight M2MAuthentication reinforcing DTLS for CoAP”, in IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 215-219.
-
(2014)
In Ieee International Conference on Pervasive Computing and Communications Workshops
, pp. 215-219
-
-
Ukil, A.1
Bandyopadhyay, S.2
Bhattacharyya, A.3
Pal, A.4
-
28
-
-
70350423560
-
Nonce generators and the nonce reset problem
-
Springer Berlin Heidelberg
-
Zenner, E. (2009), “Nonce generators and the nonce reset problem”, 12th International Security Conference, Springer Berlin Heidelberg, pp. 411-426.
-
(2009)
12Th International Security Conference
, pp. 411-426
-
-
Zenner, E.1
|