Search dblp for Publications

export results for "toc:db/conf/huc/aspi2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/huc/BerhanuAH13,
  author       = {Yared Berhanu and
                  Habtamu Abie and
                  Mohamed Hamdi},
  title        = {A testbed for adaptive security for IoT in eHealth},
  booktitle    = {Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp
                  2013, Zurich, Switzerland, September 8, 2013},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523501.2523506},
  doi          = {10.1145/2523501.2523506},
  timestamp    = {Tue, 06 Nov 2018 16:58:40 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/BerhanuAH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/Hamdi13,
  author       = {Mohamed Hamdi},
  title        = {Secure cooperative physical-layer coding for the internet of things},
  booktitle    = {Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp
                  2013, Zurich, Switzerland, September 8, 2013},
  pages        = {4:1--4:7},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523501.2523505},
  doi          = {10.1145/2523501.2523505},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/Hamdi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/KrentzRM13,
  author       = {Konrad{-}Felix Krentz and
                  Hosnieh Rafiee and
                  Christoph Meinel},
  title        = {6LoWPAN security: adding compromise resilience to the 802.15.4 security
                  sublayer},
  booktitle    = {Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp
                  2013, Zurich, Switzerland, September 8, 2013},
  pages        = {1:1--1:10},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523501.2523502},
  doi          = {10.1145/2523501.2523502},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/KrentzRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/PignottiE13,
  author       = {Edoardo Pignotti and
                  Peter Edwards},
  title        = {Trusted tiny things: making the internet of things more transparent
                  to users},
  booktitle    = {Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp
                  2013, Zurich, Switzerland, September 8, 2013},
  pages        = {2:1--2:4},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523501.2523503},
  doi          = {10.1145/2523501.2523503},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/PignottiE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/SavolaA13,
  author       = {Reijo M. Savola and
                  Habtamu Abie},
  title        = {Metrics-driven security objective decomposition for an e-health application
                  with adaptive security management},
  booktitle    = {Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp
                  2013, Zurich, Switzerland, September 8, 2013},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523501.2523507},
  doi          = {10.1145/2523501.2523507},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/SavolaA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/TaoP13,
  author       = {Ran Tao and
                  Stefan Poslad},
  title        = {Delay sensitive distributed sensor data exchange for an IoT},
  booktitle    = {Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp
                  2013, Zurich, Switzerland, September 8, 2013},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523501.2523508},
  doi          = {10.1145/2523501.2523508},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/huc/TaoP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/UkilBBP13,
  author       = {Arijit Ukil and
                  Soma Bandyopadhyay and
                  Abhijan Bhattacharyya and
                  Arpan Pal},
  title        = {Lightweight security scheme for vehicle tracking system using CoAP},
  booktitle    = {Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp
                  2013, Zurich, Switzerland, September 8, 2013},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523501.2523504},
  doi          = {10.1145/2523501.2523504},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/UkilBBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/huc/2013aspi,
  title        = {Proceedings of the International Workshop on Adaptive Security, ASPI@UbiComp
                  2013, Zurich, Switzerland, September 8, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523501},
  doi          = {10.1145/2523501},
  isbn         = {978-1-4503-2543-1},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/2013aspi.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics