Filter
Book chapter

Search results

  • 2022

    Secure Ownership Transfer for Resource Constrained IoT Infrastructures

    Gunnarsson, M. & Gehrmann, C., 2022, Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Revised Selected Papers. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). Springer Science and Business Media B.V., p. 22-47 26 p. (Communications in Computer and Information Science; vol. 1545 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

  • 2017

    A secure group-based AKA protocol for machine-type communications

    Giustolisi, R., Gehrmann, C., Ahlström, M. & Holmberg, S., 2017 Nov 30, Information Security and Cryptology – ICISC 2016: 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers. Hong, S. & Park, J. H. (eds.). Cham: Springer, p. 3-27 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review