-
1
-
-
84886897238
-
Non-intrusive healthcare system in global machine-to-machine networks
-
S.-J. Jung and W.-Y. Chung, "Non-Intrusive Healthcare System in Global Machine-to-Machine Networks," in Proc. of IEEE Sensors Journal, (Volume:13, Issue:12), 2013.
-
(2013)
Proc. of IEEE Sensors Journal
, vol.13
, Issue.12
-
-
Jung, S.-J.1
Chung, W.-Y.2
-
2
-
-
33746613037
-
Datagram transport layer security version 1.2
-
E. Rescorla and N. Modadugu, "Datagram Transport Layer Security Version 1.2," RFC 6347, IETF, 2012.
-
(2012)
RFC 6347, IETF
-
-
Rescorla, E.1
Modadugu, N.2
-
5
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. of IEEE PerCom, 2005.
-
(2005)
Proc. of IEEE PerCom
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
6
-
-
84896743669
-
Tailoring end-to-end IP security protocols to the internet of things
-
R. Hummen, H. Wirtz, J. H. Ziegeldorf, J. Hiller, and K. Wehrle, "Tailoring End-to-End IP Security Protocols to the Internet of Things," in Proc. of IEEE ICNP, 2013.
-
(2013)
Proc. of IEEE ICNP
-
-
Hummen, R.1
Wirtz, H.2
Ziegeldorf, J.H.3
Hiller, J.4
Wehrle, K.5
-
8
-
-
33746690237
-
Transmission of IPv6 packets over IEEE 802.15.4 networks
-
G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks," RFC 4944, IETF, 2007.
-
(2007)
RFC 4944, IETF
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
9
-
-
84921048821
-
Practical considerations and implementation experiences in securing smart object networks
-
M. Sethi, J. Arkko, A. Keranen, and H. Rissanen, "Practical Considerations and Implementation Experiences in Securing Smart Object Networks," draft-aks-crypto-sensors-02 (WiP), IETF, 2012.
-
(2012)
Draft-aks-crypto-sensors-02 (WiP), IETF
-
-
Sethi, M.1
Arkko, J.2
Keranen, A.3
Rissanen, H.4
-
11
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Proc. of Security Protocols, 1999.
-
(1999)
Proc. of Security Protocols
-
-
Stajano, F.1
Anderson, R.2
-
12
-
-
79959884874
-
Message-in-A-bottle: Userfriendly and secure key deployment for sensor nodes
-
C. Kuo, M. Luk, R. Negi, and A. Perrig, "Message-in-A-bottle: Userfriendly and secure key deployment for sensor nodes," in Proc. of ACM SenSys, 2007.
-
(2007)
Proc. of ACM SenSys
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
13
-
-
84921048818
-
Transport layer security (TLS) session resumption without server-side state
-
H. Zhou, P. Eronen, and H. Tschofenig, "Transport Layer Security (TLS) Session Resumption without Server-Side State," RFC 5077, IETF, 2008.
-
(2008)
RFC5077, IETF
-
-
Zhou, H.1
Eronen, P.2
Tschofenig, H.3
-
14
-
-
84921048817
-
Extended DTLS session resumption for constrained network environments
-
R. Hummen, J. Gilger, and H. Shafagh, "Extended DTLS Session Resumption for Constrained Network Environments," draft-hummendtls-extended-session-resumption-01 (WiP), IETF, 2013.
-
(2013)
Draft-hummendtls-extended-session-resumption-01 (WiP), IETF
-
-
Hummen, R.1
Gilger, J.2
Shafagh, H.3
-
15
-
-
84921048816
-
-
Arago Systems WiSMote[Online, last accessed: 08.04.2014]
-
Arago Systems, "WiSMote," http://www.aragosystems.com/images/sto ries/WiSMote/Doc/wismote en.pdf, [Online, last accessed: 08.04.2014].
-
-
-
-
16
-
-
20544456753
-
Contiki-A lightweight and flexible operating system for tiny networked sensors
-
A. Dunkels, B. Gronvall, and T. Voigt, "Contiki-A Lightweight and Flexible Operating System for Tiny Networked Sensors," in Proc. of IEEE LCN, 2004.
-
(2004)
Proc. of IEEE LCN
-
-
Dunkels, A.1
Gronvall, B.2
Voigt, T.3
-
17
-
-
84905683526
-
FlockLab: A testbed for distributed, synchronized tracing and profiling of wireless embedded systems
-
R. Lim, F. Ferrari, M. Zimmerling, C. Walser, P. Sommer, and J. Beutel, "FlockLab: A testbed for distributed, synchronized tracing and profiling of wireless embedded systems," in Proc. of ACM/IEEE IPSN, 2013.
-
(2013)
Proc. of ACM/IEEE IPSN
-
-
Lim, R.1
Ferrari, F.2
Zimmerling, M.3
Walser, C.4
Sommer, P.5
Beutel, J.6
-
18
-
-
84938727870
-
Constrained application protocol (CoAP)
-
Z. Shelby, K. Hartke, and C. Bormann, "Constrained Application Protocol (CoAP)," draft-ietf-core-coap-18 (WiP), IETF, 2013.
-
(2013)
Draft-ietf-core-coap-18 (WiP), IETF
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
19
-
-
84879533211
-
6LoWPAN fragmentation attacks and mitigation mechanisms
-
R. Hummen, J. Hiller, H. Wirtz, M. Henze, H. Shafagh, and K. Wehrle, "6LoWPAN Fragmentation Attacks and Mitigation Mechanisms," in Proc. of ACM WiSec, 2013.
-
(2013)
Proc. of ACM WiSec
-
-
Hummen, R.1
Hiller, J.2
Wirtz, H.3
Henze, M.4
Shafagh, H.5
Wehrle, K.6
-
20
-
-
84890847807
-
End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication
-
J. Granjal, E. Monteiro, and J. S. Silva, "End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication," in Proc. of IFIP Networking, 2013.
-
(2013)
Proc. of IFIP Networking
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
21
-
-
84921048812
-
Tiny 3-TLS: A trust delegation protocol for wireless sensor networks
-
S. Fouladgar, B. Mainaud, K. Masmoudi, and H. Afifis, "Tiny 3-TLS: A trust delegation protocol for wireless sensor networks," in Proc. of Security and Privacy in Ad-Hoc and Sensor Networks, 2006.
-
(2006)
Proc. of Security and Privacy in Ad-Hoc and Sensor Networks
-
-
Fouladgar, S.1
Mainaud, B.2
Masmoudi, K.3
Afifis, H.4
-
22
-
-
84866380368
-
Secure communication for smart iot objects: Protocol stacks, use cases and practical examples
-
R. Bonetto, N. Bui, V. Lakkundi, A. Olivereau, A. Serbanati, and M. Rossi, "Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples," in In Proc. of IEEE WoWMoM, 2012.
-
(2012)
Proc. of IEEE WoWMoM
-
-
Bonetto, R.1
Bui, N.2
Lakkundi, V.3
Olivereau, A.4
Serbanati, A.5
Rossi, M.6
-
23
-
-
84866415772
-
D-HIP: A distributed key exchange scheme for HIP-based Internet of Things
-
Y. B. Saied and A. Olivereau, "D-HIP: A distributed key exchange scheme for HIP-based Internet of Things," in Proc. of IEEE WoWMoM, 2012.
-
(2012)
Proc. of IEEE WoWMoM
-
-
Saied, Y.B.1
Olivereau, A.2
-
24
-
-
84870360741
-
(k, n) threshold distributed key exchange for HIP based internet of things
-
Y. B. Saied and A. Olivereau, "(k, n) threshold distributed key exchange for HIP based internet of things," in Proc. of ACM MobiWac, 2012.
-
(2012)
Proc. of ACM MobiWac
-
-
Saied, Y.B.1
Olivereau, A.2
-
25
-
-
84896771664
-
HIP tiny exchange (TEX): A distributed key exchange scheme for hip-based internet of things
-
Y. B. Saied and A. Olivereau, "HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things," in Proc. of ComNet, 2012.
-
(2012)
Proc. of ComNet
-
-
Saied, Y.B.1
Olivereau, A.2
-
26
-
-
77955321466
-
Server-based certificate validation protocol (SCVP)
-
T. Freeman, R. Housley, A. Malpani, D. Cooper, and W. Polk, "Server-Based Certificate Validation Protocol (SCVP)," RFC 5055, 2007.
-
(2007)
RFC 5055
-
-
Freeman, T.1
Housley, R.2
Malpani, A.3
Cooper, D.4
Polk, W.5
-
27
-
-
84879548737
-
Towards viable certificate-based authentication for the internet of things
-
R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards Viable Certificate-based Authentication for the Internet of Things," in Proc. of ACM HotWiSec, 2013.
-
(2013)
Proc. of ACM HotWiSec
-
-
Hummen, R.1
Ziegeldorf, J.H.2
Shafagh, H.3
Raza, S.4
Wehrle, K.5
-
28
-
-
78049413781
-
Secfleck: A public key technology platform for wireless sensor networks
-
W. Hu, P. Corke, W. Shih, and L. Overs, "secfleck: A public key technology platform for wireless sensor networks," in Proc. of EWSN, 2009.
-
(2009)
Proc. of EWSN
-
-
Hu, W.1
Corke, P.2
Shih, W.3
Overs, L.4
-
29
-
-
84885304488
-
DTLS based security and two-way authentication for the Internet of Things
-
T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle, "DTLS based security and two-way authentication for the Internet of Things," in Ad Hoc Networks (Volume:11, Issue:8), 2013.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brunig, M.4
Carle, G.5
-
30
-
-
84921048810
-
Standards for efficient cryptography 4: Elliptic curve qu-vanstone implicit certificate scheme (ECQV), working draft
-
March
-
G. Zaverucha, "Standards for Efficient Cryptography 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV), Working Draft," Certicom Research, March 2011.
-
(2011)
Certicom Research
-
-
Zaverucha, G.1
-
31
-
-
84879546251
-
Securing the IP-based internet of things with HIP and DTLS
-
O. Garcia-Morchon, S. L. Keoh, S. Kumar, P. Moreno-Sanchez, F. Vidal-Meca, and J. H. Ziegeldorf, "Securing the IP-based internet of things with HIP and DTLS," in Proc. of ACM WiSec, 2013.
-
(2013)
Proc. of ACM WiSec
-
-
Garcia-Morchon, O.1
Keoh, S.L.2
Kumar, S.3
Moreno-Sanchez, P.4
Vidal-Meca, F.5
Ziegeldorf, J.H.6
-
32
-
-
84883314073
-
Lithe: Lightweight secure CoAP for the internet of things
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things," in IEEE Sensors Journal (Volume:13, Issue:10), 2013.
-
(2013)
IEEE Sensors Journal
, vol.13
, Issue.10
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
|