default search action
Ad Hoc Networks, Volume 32
Volume 32, September 2015
- Yacine Challal, Enrico Natalizio, Sevil Sen, Anna Maria Vegni:
Internet of Things security and privacy: Design methods and optimization. 1-2
- Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, Roberto Guizzetti:
OSCAR: Object security architecture for the Internet of Things. 3-16 - Kim Thuat Nguyen, Maryline Laurent, Nouha Oualha:
Survey on secure communication protocols for the Internet of Things. 17-31
- Mete Akgün, M. Ufuk Çaglayan:
Providing destructive privacy and scalability in RFID systems using PUFs. 32-42 - José María de Fuentes, Pedro Peris-Lopez, Juan E. Tapiador, Sergio Pastrana:
Probabilistic yoking proofs for large scale IoT systems. 43-52 - Jon R. Ward, Mohamed F. Younis:
Increasing base station anonymity using distributed beamforming. 53-80
- Ahmed Mostefaoui, Hassan Noura, Zeinab Fawaz:
An integrated multimedia data reduction and content confidentiality approach for limited networked devices. 81-97 - Omar Rafik Merad Boudia, Sidi Mohammed Senouci, Mohammed Feham:
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. 98-113
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.