Corinna Schmitt
Title
Cited by
Cited by
Year
DTLS based security and two-way authentication for the Internet of Things
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
Ad Hoc Networks 11 (8), 2710-2723, 2013
4022013
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014
1972014
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brunig, G Carle
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference …, 2012
1882012
A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication
T Kothmayr, C Schmitt, W Hu, M Brünig, G Carle
37th Annual IEEE Conference on Local Computer Networks-Workshops, 956-963, 2012
1882012
The Quest for Privacy in the Internet of Things
P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos
IEEE Cloud Computing 2016 (3), 34-43, 2016
1662016
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
International Journal of Distributed Sensor Networks 10 (7), 357430, 2014
1362014
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, M Ylianttila, B Stiller
IEEE Access, 1503-1511, 2015
942015
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
IEEE Access 3, 1503-1511, 2015
942015
Poster: Securing the internet of things with DTLS
T Kothmayr, W Hu, C Schmitt, M Bruenig, G Carle
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems …, 2011
252011
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (printed version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications 74, 63-76, 2016
222016
TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems (online version)
C Schmitt, T Kothmayr, B Ertl, W Hu, L Braun, G Carle
Computer Communications, 2014
22*2014
Certificate-based pairwise key establishment protocol for wireless sensor networks
P Porambage, P Kumar, C Schmitt, A Gurtov, M Ylianttila
2013 IEEE 16th International Conference on Computational Science and …, 2013
222013
ARMED: How Automatic Malware Modifications Can Evade Static Detection?
RL Castro, C Schmitt, GD Rodosek
2019 5th International Conference on Information Management (ICIM), 20-27, 2019
172019
AIMED: Evolving Malware with Genetic Programming to Evade Detection
RL Castro, C Schmitt, G Dreo
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
162019
TinyTO: Two-way Authentication for Constrained Devices in the Internet-of-Things
C Schmitt, M Noack, B Stiller
Internet of Things - Principles and Paradigms, 239-258, 2016
152016
Two-way Authentication for the Internet-of-Things
C Schmitt, T Kothmayr, W Hu, B Stiller
Securing the Internet of Things through Progressive Threat Detection and …, 2015
152015
Gathering sensor data in home networks with IPFIX
T Kothmayr, C Schmitt, L Braun, G Carle
European Conference on Wireless Sensor Networks, 131-146, 2010
132010
Towards Successful Realization of the LDACS Cybersecurity Architecture: An Updated Datalink Security Threat-and Risk Analysis
N Mäurer, C Schmitt
2019 Integrated Communications, Navigation and Surveillance Conference (ICNS …, 2019
122019
Survey of Angle-based Forwarding Methods in VANET Communications
L Kristiana, C Schmitt, B Stiller
Wireless Days 2016, 2016
122016
Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
2015 IEEE 40th Conference on Local Computer Networks (LCN), 482-485, 2015
122015
The system can't perform the operation now. Try again later.
Articles 1–20