Folgen
Corinna Schmitt
Corinna Schmitt
Research Institute CODE, Universität der Bundeswehr München
Bestätigte E-Mail-Adresse bei unibw.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
DTLS based security and two-way authentication for the Internet of Things
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
Ad Hoc Networks 11 (8), 2710-2723, 2013
5382013
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014
2772014
The Quest for Privacy in the Internet of Things
P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos
IEEE Cloud Computing 2016 (3), 34-43, 2016
2482016
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brunig, G Carle
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012
2482012
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
37th Annual IEEE Conference on Local Computer Networks-Workshops, 956-963, 2012
2482012
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
International Journal of Distributed Sensor Networks 10 (7), 357430, 2014
1812014
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, M Ylianttila, B Stiller
IEEE Access, 1503-1511, 2015
1342015
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
IEEE Access 3, 1503-1511, 2015
1342015
AIMED: Evolving Malware with Genetic Programming to Evade Detection
RL Castro, C Schmitt, G Dreo
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
522019
ARMED: How Automatic Malware Modifications Can Evade Static Detection?
RL Castro, C Schmitt, GD Rodosek
2019 5th International Conference on Information Management (ICIM), 20-27, 2019
412019
Certificate-based pairwise key establishment protocol for wireless sensor networks
P Porambage, P Kumar, C Schmitt, A Gurtov, M Ylianttila
2013 IEEE 16th International Conference on Computational Science and …, 2013
382013
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (printed version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications 74, 63-76, 2016
282016
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (online version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications, 2014
28*2014
Poster: Securing the internet of things with DTLS
T Kothmayr, W Hu, C Schmitt, M Bruenig, G Carle
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems …, 2011
282011
An Overview of Network Communication Technologies for IoT
B Stiller, E Schiller, C Schmitt, S Ziegler
Handbook of Internet-of-Things, S. Ziegler and JM, Eds. Cham, Switzerland …, 2020
272020
TinyTO: Two-way Authentication for Constrained Devices in the Internet-of-Things
C Schmitt, M Noack, B Stiller
Internet of Things - Principles and Paradigms, 239-258, 2016
262016
Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS
N Mäurer, T Gräupl, C Gentsch, C Schmitt
2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 1-10, 2020
202020
Two-way Authentication for the Internet-of-Things
C Schmitt, T Kothmayr, W Hu, B Stiller
Securing the Internet of Things through Progressive Threat Detection and …, 2015
192015
CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks
C Schmitt, A Freitag, G Carle
Proceedings of the 9th International Conference on Network and Service …, 2013
182013
CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks
C Schmitt, A Freitag, G Carle
Proceedings of the 9th International Conference on Network and Service …, 2013
182013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20