Follow
Corinna Schmitt
Corinna Schmitt
Research Institute CODE, Universität der Bundeswehr München
Verified email at unibw.de - Homepage
Title
Cited by
Cited by
Year
DTLS based security and two-way authentication for the Internet of Things
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
Ad Hoc Networks 11 (8), 2710-2723, 2013
5392013
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014
2842014
The Quest for Privacy in the Internet of Things
P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos
IEEE Cloud Computing 2016 (3), 34-43, 2016
2542016
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brunig, G Carle
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012
2482012
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
37th Annual IEEE Conference on Local Computer Networks-Workshops, 956-963, 2012
2482012
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
International Journal of Distributed Sensor Networks 10 (7), 357430, 2014
1832014
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, M Ylianttila, B Stiller
IEEE Access, 1503-1511, 2015
1392015
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
IEEE Access 3, 1503-1511, 2015
1392015
AIMED: Evolving Malware with Genetic Programming to Evade Detection
RL Castro, C Schmitt, G Dreo
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
542019
ARMED: How Automatic Malware Modifications Can Evade Static Detection?
RL Castro, C Schmitt, GD Rodosek
2019 5th International Conference on Information Management (ICIM), 20-27, 2019
442019
Certificate-based pairwise key establishment protocol for wireless sensor networks
P Porambage, P Kumar, C Schmitt, A Gurtov, M Ylianttila
2013 IEEE 16th International Conference on Computational Science and …, 2013
392013
An Overview of Network Communication Technologies for IoT
B Stiller, E Schiller, C Schmitt, S Ziegler
Handbook of Internet-of-Things, S. Ziegler and JM, Eds. Cham, Switzerland …, 2020
312020
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (printed version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications 74, 63-76, 2016
282016
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (online version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications, 2014
28*2014
Poster: Securing the internet of things with DTLS
T Kothmayr, W Hu, C Schmitt, M Bruenig, G Carle
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems …, 2011
282011
TinyTO: Two-way Authentication for Constrained Devices in the Internet-of-Things
C Schmitt, M Noack, B Stiller
Internet of Things - Principles and Paradigms, 239-258, 2016
252016
Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS
N Mäurer, T Gräupl, C Gentsch, C Schmitt
2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 1-10, 2020
212020
Security in digital aeronautical communications a comprehensive gap analysis
N Mäurer, T Guggemos, T Ewert, T Gräupl, C Schmitt, ...
International Journal of Critical Infrastructure Protection 38, 100549, 2022
192022
Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis
N Mäurer, C Schmitt
2019 Integrated Communications, Navigation and Surveillance Conference (ICNS …, 2019
192019
Two-way Authentication for the Internet-of-Things
C Schmitt, T Kothmayr, W Hu, B Stiller
Securing the Internet of Things through Progressive Threat Detection and …, 2015
192015
The system can't perform the operation now. Try again later.
Articles 1–20