DTLS based security and two-way authentication for the Internet of Things T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle Ad Hoc Networks 11 (8), 2710-2723, 2013 | 539 | 2013 |
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila 2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014 | 284 | 2014 |
The Quest for Privacy in the Internet of Things P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos IEEE Cloud Computing 2016 (3), 34-43, 2016 | 254 | 2016 |
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication T Kothmayr, C Schmitt, W Hu, M Brunig, G Carle Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012 | 248 | 2012 |
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle 37th Annual IEEE Conference on Local Computer Networks-Workshops, 956-963, 2012 | 248 | 2012 |
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila International Journal of Distributed Sensor Networks 10 (7), 357430, 2014 | 183 | 2014 |
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications P Porambage, A Braeken, C Schmitt, M Ylianttila, B Stiller IEEE Access, 1503-1511, 2015 | 139 | 2015 |
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller IEEE Access 3, 1503-1511, 2015 | 139 | 2015 |
AIMED: Evolving Malware with Genetic Programming to Evade Detection RL Castro, C Schmitt, G Dreo 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 54 | 2019 |
ARMED: How Automatic Malware Modifications Can Evade Static Detection? RL Castro, C Schmitt, GD Rodosek 2019 5th International Conference on Information Management (ICIM), 20-27, 2019 | 44 | 2019 |
Certificate-based pairwise key establishment protocol for wireless sensor networks P Porambage, P Kumar, C Schmitt, A Gurtov, M Ylianttila 2013 IEEE 16th International Conference on Computational Science and …, 2013 | 39 | 2013 |
An Overview of Network Communication Technologies for IoT B Stiller, E Schiller, C Schmitt, S Ziegler Handbook of Internet-of-Things, S. Ziegler and JM, Eds. Cham, Switzerland …, 2020 | 31 | 2020 |
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (printed version) C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle Computer Communications 74, 63-76, 2016 | 28 | 2016 |
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (online version) C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle Computer Communications, 2014 | 28* | 2014 |
Poster: Securing the internet of things with DTLS T Kothmayr, W Hu, C Schmitt, M Bruenig, G Carle Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems …, 2011 | 28 | 2011 |
TinyTO: Two-way Authentication for Constrained Devices in the Internet-of-Things C Schmitt, M Noack, B Stiller Internet of Things - Principles and Paradigms, 239-258, 2016 | 25 | 2016 |
Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS N Mäurer, T Gräupl, C Gentsch, C Schmitt 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 1-10, 2020 | 21 | 2020 |
Security in digital aeronautical communications a comprehensive gap analysis N Mäurer, T Guggemos, T Ewert, T Gräupl, C Schmitt, ... International Journal of Critical Infrastructure Protection 38, 100549, 2022 | 19 | 2022 |
Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis N Mäurer, C Schmitt 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS …, 2019 | 19 | 2019 |
Two-way Authentication for the Internet-of-Things C Schmitt, T Kothmayr, W Hu, B Stiller Securing the Internet of Things through Progressive Threat Detection and …, 2015 | 19 | 2015 |