


default search action
Ad Hoc Networks, Volume 32
Volume 32, September 2015
- Yacine Challal
, Enrico Natalizio, Sevil Sen
, Anna Maria Vegni
:
Internet of Things security and privacy: Design methods and optimization. 1-2
- Malisa Vucinic
, Bernard Tourancheau, Franck Rousseau
, Andrzej Duda
, Laurent Damon, Roberto Guizzetti:
OSCAR: Object security architecture for the Internet of Things. 3-16 - Kim Thuat Nguyen, Maryline Laurent
, Nouha Oualha
:
Survey on secure communication protocols for the Internet of Things. 17-31
- Mete Akgün, M. Ufuk Çaglayan
:
Providing destructive privacy and scalability in RFID systems using PUFs. 32-42 - José María de Fuentes
, Pedro Peris-Lopez
, Juan E. Tapiador
, Sergio Pastrana
:
Probabilistic yoking proofs for large scale IoT systems. 43-52 - Jon R. Ward, Mohamed F. Younis
:
Increasing base station anonymity using distributed beamforming. 53-80
- Ahmed Mostefaoui, Hassan Noura
, Zeinab Fawaz:
An integrated multimedia data reduction and content confidentiality approach for limited networked devices. 81-97 - Omar Rafik Merad Boudia
, Sidi Mohammed Senouci
, Mohammed Feham:
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. 98-113

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.