Seguir
Corinna Schmitt
Corinna Schmitt
Research Institute CODE, Universität der Bundeswehr München
Dirección de correo verificada de unibw.de - Página principal
Título
Citado por
Citado por
Año
DTLS based security and two-way authentication for the Internet of Things
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
Ad Hoc Networks 11 (8), 2710-2723, 2013
5342013
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014
2732014
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brunig, G Carle
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012
2462012
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
37th Annual IEEE Conference on Local Computer Networks-Workshops, 956-963, 2012
2462012
The Quest for Privacy in the Internet of Things
P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos
IEEE Cloud Computing 2016 (3), 34-43, 2016
2372016
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
International Journal of Distributed Sensor Networks 10 (7), 357430, 2014
1792014
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, M Ylianttila, B Stiller
IEEE Access, 1503-1511, 2015
1312015
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
IEEE Access 3, 1503-1511, 2015
1312015
AIMED: Evolving Malware with Genetic Programming to Evade Detection
RL Castro, C Schmitt, G Dreo
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
502019
ARMED: How Automatic Malware Modifications Can Evade Static Detection?
RL Castro, C Schmitt, GD Rodosek
2019 5th International Conference on Information Management (ICIM), 20-27, 2019
412019
Certificate-based pairwise key establishment protocol for wireless sensor networks
P Porambage, P Kumar, C Schmitt, A Gurtov, M Ylianttila
2013 IEEE 16th International Conference on Computational Science and …, 2013
382013
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (printed version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications 74, 63-76, 2016
282016
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (online version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications, 2014
28*2014
Poster: Securing the internet of things with DTLS
T Kothmayr, W Hu, C Schmitt, M Bruenig, G Carle
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems …, 2011
282011
An Overview of Network Communication Technologies for IoT
B Stiller, E Schiller, C Schmitt, S Ziegler
Handbook of Internet-of-Things, S. Ziegler and JM, Eds. Cham, Switzerland …, 2020
262020
TinyTO: Two-way Authentication for Constrained Devices in the Internet-of-Things
C Schmitt, M Noack, B Stiller
Internet of Things - Principles and Paradigms, 239-258, 2016
262016
Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS
N Mäurer, T Gräupl, C Gentsch, C Schmitt
2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 1-10, 2020
202020
Two-way Authentication for the Internet-of-Things
C Schmitt, T Kothmayr, W Hu, B Stiller
Securing the Internet of Things through Progressive Threat Detection and …, 2015
192015
Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis
N Mäurer, C Schmitt
2019 Integrated Communications, Navigation and Surveillance Conference (ICNS …, 2019
172019
CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks
C Schmitt, A Freitag, G Carle
Proceedings of the 9th International Conference on Network and Service …, 2013
172013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20