Follow
Corinna Schmitt
Title
Cited by
Cited by
Year
DTLS based security and two-way authentication for the Internet of Things
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
Ad Hoc Networks 11 (8), 2710-2723, 2013
4652013
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014
2352014
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brunig, G Carle
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012
2192012
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
37th Annual IEEE Conference on Local Computer Networks-Workshops, 956-963, 2012
2192012
The Quest for Privacy in the Internet of Things
P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos
IEEE Cloud Computing 2016 (3), 34-43, 2016
2012016
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
International Journal of Distributed Sensor Networks 10 (7), 357430, 2014
1522014
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, M Ylianttila, B Stiller
IEEE Access, 1503-1511, 2015
1192015
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
IEEE Access 3, 1503-1511, 2015
1192015
AIMED: Evolving Malware with Genetic Programming to Evade Detection
RL Castro, C Schmitt, G Dreo
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
332019
ARMED: How Automatic Malware Modifications Can Evade Static Detection?
RL Castro, C Schmitt, GD Rodosek
2019 5th International Conference on Information Management (ICIM), 20-27, 2019
282019
Certificate-based pairwise key establishment protocol for wireless sensor networks
P Porambage, P Kumar, C Schmitt, A Gurtov, M Ylianttila
2013 IEEE 16th International Conference on Computational Science and …, 2013
282013
Poster: Securing the internet of things with DTLS
T Kothmayr, W Hu, C Schmitt, M Bruenig, G Carle
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems …, 2011
262011
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (printed version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications 74, 63-76, 2016
252016
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (online version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications, 2014
25*2014
TinyTO: Two-way Authentication for Constrained Devices in the Internet-of-Things
C Schmitt, M Noack, B Stiller
Internet of Things - Principles and Paradigms, 239-258, 2016
222016
Two-way Authentication for the Internet-of-Things
C Schmitt, T Kothmayr, W Hu, B Stiller
Securing the Internet of Things through Progressive Threat Detection and …, 2015
172015
Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis
N Mäurer, C Schmitt
2019 Integrated Communications, Navigation and Surveillance Conference (ICNS …, 2019
152019
Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS
N Mäurer, T Gräupl, C Gentsch, C Schmitt
2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), 1-10, 2020
142020
Survey of Angle-based Forwarding Methods in VANET Communications
L Kristiana, C Schmitt, B Stiller
Wireless Days 2016, 2016
142016
CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks
C Schmitt, A Freitag, G Carle
Proceedings of the 9th International Conference on Network and Service …, 2013
142013
The system can't perform the operation now. Try again later.
Articles 1–20