Follow
Göran Selander
Göran Selander
Verified email at ericsson.com
Title
Cited by
Cited by
Year
Object Security for Constrained RESTful Environments (OSCORE)
G Selander, J Mattsson, F Palombini, L Seitz
https://tools.ietf.org/html/rfc8613, 2019
197*2019
Authorization framework for the internet-of-things
L Seitz, G Selander, C Gehrmann
2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013
1642013
S3K: Scalable security with symmetric keys—DTLS key establishment for the Internet of Things
S Raza, L Seitz, D Sitenkov, G Selander
IEEE Transactions on Automation Science and Engineering 13 (3), 1270-1280, 2016
1402016
Method and network for securely delivering streaming data
F Lindholm, R Blom, K Norrman, G Selander, M Näslund
US Patent 7,917,946, 2011
1192011
RFC 9200: Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)
L Seitz, G Selander, E Wahlstroem, S Erdtman, H Tschofenig
RFC Editor, 2022
117*2022
Ephemeral diffie-hellman over cose (edhoc)
G Selander, J Mattsson, F Palombini
Internet Engineering Task Force, Internet-Draft draft-ietf-lake-edhoc-09, 2021
1082021
Method and network for securely delivering streaming data
F Lindholm, R Blom, K Norrman, G Selander, M Näslund
US Patent 8,196,194, 2012
822012
Privacy in machine-to-machine communications a state-of-the-art survey
Y Cheng, M Naslund, G Selander, E Fogelström
2012 IEEE International Conference on Communication Systems (ICCS), 75-79, 2012
542012
New paradigms for access control in constrained environments
A Cherkaoui, L Bossuet, L Seitz, G Selander, R Borgaonkar
2014 9th International Symposium on Reconfigurable and Communication-Centric …, 2014
502014
Use cases for authentication and authorization in constrained environments
L Seitz, S Gerdes, G Selander, M Mani, S Kumar
482016
Verifying neighbor cell
J Rune, J Alonso-Rubio, G Selander
US Patent 8,630,648, 2014
482014
Apparatus and methods for obtaining a password hint
G Selander, M Näslund
US Patent 9,524,395, 2016
392016
Setup and configuration of relay nodes
A Rácz, G Selander, M Näslund, L Barriga, M Lindström, G Mildh, ...
US Patent 8,797,940, 2014
312014
CRC-based message authentication for 5G mobile technology
E Dubrova, M Näslund, G Selander
2015 IEEE Trustcom/BigDataSE/ISPA 1, 1186-1191, 2015
282015
Radio access system attachment
J Sachs, G Selander, A Méhes, T Rinta-Aho, J Lundsjö, J Arkko, ...
US Patent App. 12/295,892, 2009
272009
Group oscore-secure group communication for coap
M Tiloca, G Selander, F Palombini, J Park
Internet-Draft-work in progress 13. IETF, 2021
202021
Network composition
M Johnsson, A Mehés, G Selander, N Papadoglou, M Priestley, R Aguero, ...
Wireless World Research Forum 15, 2005
202005
An architecture for authorization in constrained environments
S Gerdes, L Seitz, G Selander, C Bormann
IETF Draft, October 22, 2018
192018
Compression of IPsec AH and ESP headers for constrained environments
S Raza, S Duquennoy, G Selander
draft-raza-6lowpanipsec-00 (WiP), IETF, 2013
192013
Datagram transport layer security (DTLS) profile for authentication and authorization for constrained environments (ACE)
S Gerdes, O Bergmann, C Bormann, G Selander, L Seitz
Internet Engineering Task Force, Internet-Draft draft-ietf-acedtls-authorize-03, 2018
182018
The system can't perform the operation now. Try again later.
Articles 1–20