Ubiquitous computing describes the notion that computing devices will be everywhere: clothing, walls and floors of buildings, cars, forests, deserts, etc. Ubiquitous computing is becoming a reality: RFIDs are currently being introduced into the supply chain. Wireless distributed sensor networks (WSN) are already being used to monitor wildlife and to track military targets. Many more applications are being envisioned. For most of these applications some level of security is of utmost importance. Common to WSN and RFIDs are their severely limited power resources, which classify them as ultra-low power devices. Early sensor nodes used simple 8-bit microprocessors to implement basic communication, sensing and computing services. Security was an...
Emerging applications in the Internet of Things (IoT) domain, such as wearables, implantables, smart...
Wireless networks afford many benefits compared to wired networks in terms of their usability in dyn...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
This dissertation examines the theoretical context for the security of wireless communication betwee...
Our society greatly depends on services and applications provided by mobile communication networks. ...
Energy efficiency is playing a major role in the proliferation of low-power wireless sensing and ide...
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequen...
The applications related to ultra-low power wearables like internet of things, robotics, intrusion d...
The design and implementation of security threat mitigation mechanisms in RFID systems, specially in...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
Authentication and Privacy are important concerns in current low power wireless devices like RFID an...
Message Authentication Codes (MACs) are valuable tools for ensuring the integrity of messages. MACs ...
Authentication and Privacy are important concerns in current low power wireless devices like RFID an...
Devices of extremely small computational power like RFID tags are used in practice to a rapidly grow...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Emerging applications in the Internet of Things (IoT) domain, such as wearables, implantables, smart...
Wireless networks afford many benefits compared to wired networks in terms of their usability in dyn...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
This dissertation examines the theoretical context for the security of wireless communication betwee...
Our society greatly depends on services and applications provided by mobile communication networks. ...
Energy efficiency is playing a major role in the proliferation of low-power wireless sensing and ide...
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequen...
The applications related to ultra-low power wearables like internet of things, robotics, intrusion d...
The design and implementation of security threat mitigation mechanisms in RFID systems, specially in...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
Authentication and Privacy are important concerns in current low power wireless devices like RFID an...
Message Authentication Codes (MACs) are valuable tools for ensuring the integrity of messages. MACs ...
Authentication and Privacy are important concerns in current low power wireless devices like RFID an...
Devices of extremely small computational power like RFID tags are used in practice to a rapidly grow...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Emerging applications in the Internet of Things (IoT) domain, such as wearables, implantables, smart...
Wireless networks afford many benefits compared to wired networks in terms of their usability in dyn...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...