Personensuche
X
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
3
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2..:
, In:
?
Machine Learning for Networking; Lecture Notes in Computer Science ,
4
Multi-Armed Bandit-Based Channel Hopping: Implementation on..:
, In:
?
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems ,
5
Enabling Offline Tuning of Fat Channel Communication:
, In:
?
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks ,
7
Countering Three Denial-of-Sleep Attacks on ContikiMAC:
, In:
?
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems ,
8
Enabling En-Route Filtering for End-to-End Encrypted CoAP M..:
, In:
?
Proceedings of the 31st Annual Computer Security Applications Conference ,
9
Handling Reboots and Mobility in 802.15.4 Security:
, In:
?
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices ,
10
6LoWPAN Security : Avoiding Hidden Wormholes using Chann..:
, In:
?
Proceedings of the International Workshop on Adaptive Security ,
11
6LoWPAN security : adding compromise resilience to the 8..:
, In:
?
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks ,
15