Author of the publication

D-HIP: A distributed key exchange scheme for HIP-based Internet of Things.

, and . WOWMOM, page 1-7. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges and Current Results of the TWISNet FP7 Project - (Extended Abstract)., , , , , , , , , and 1 other author(s). TrustBus, volume 7449 of Lecture Notes in Computer Science, page 232-233. Springer, (2012)(k, n) threshold distributed key exchange for HIP based internet of things., and . MOBIWAC, page 79-86. ACM, (2012)Anomaly Detection in Vehicle-to-Infrastructure Communications., , , and . VTC Spring, page 1-6. IEEE, (2018)Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things., , , and . IPCCC, page 1-9. IEEE, (2019)Efficient Network Representation for GNN-Based Intrusion Detection., , and . ACNS (1), volume 13905 of Lecture Notes in Computer Science, page 532-554. Springer, (2023)A Distributed Approach for Secure M2M Communications., , and . NTMS, page 1-7. IEEE, (2012)Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network., , , and . PST, page 1-5. IEEE, (2019)A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks., , and . IWSOS, volume 8221 of Lecture Notes in Computer Science, page 157-162. Springer, (2013)HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things., and . COMNET, page 1-8. IEEE, (2012)Pseudonymous communications in secure industrial wireless sensor networks., , and . PST, page 98-102. IEEE Computer Society, (2013)